608
Views
13
CrossRef citations to date
0
Altmetric
Original Articles

Differentially Private Significance Tests for Regression Coefficients

, , &
Pages 440-453 | Received 14 Jul 2017, Accepted 08 Oct 2018, Published online: 27 Feb 2019

References

  • Abowd, J., Stinson, M., and Benedetto, G. (2006), “Final Report to the Social Security Administration on the SIPP/SSA/IRS Public Use File Project,” Tech. rep. U.S. Census Bureau Longitudinal Employer-Household Dynamics Program. Available at http://hdl.handle.net/1813/43929.
  • Bassily, R., Smith, A., and Thakurta, A. (2014), “Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds,” in 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS). Philadelphia, PA: IEEE, 464–473.
  • Bhattacharya, R., Lin, L., and Patrangenaru, V. (2016), Course in Mathematical Statistics and Large Sample Theory, New York: Springer.
  • Campbell, Z., Bray, A., Ritz, A. and Groce, A. (2018), “Differentially Private ANOVA Testing,” in 2018 1st International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX: IEEE, 281–285.
  • Chaudhuri, K., and Monteleoni, C. (2009), “Privacy-Preserving Logistic Regression,” in Advances in Neural Information Processing Systems, eds. D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou, Vancouver, BC, Canada: Curran Associates, Inc. 289–296.
  • Chaudhuri, K., Monteleoni, C., and Sarwate, A. D. (2011), “Differentially Private Empirical Risk Minimization,” Journal of Machine Learning Research 12, 1069–1109.
  • Chen, Y., Machanavajjhala, A., Reiter, J. P., and Barrientos, A. F. (2016), “Differentially Private Regression Diagnostics,” 2016 IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 81–90.
  • Crosas, M. (2011), “The Dataverse Network: An Open-source Application for Sharing, Discovering and Preserving Data,” D-lib Magazine, 17.
  • D’Orazio, V., Honaker, J., and King, G. (2015), “Differential Privacy for Social Science Inference,” Sloan Foundation Economics Research Paper No. 2676160. Available at SSRN: https://ssrn.com/abstract=2676160.
  • Drechsler, J. (2011), Synthetic Datasets for Statistical Disclosure Control. New York: Springer-Verlag.
  • Dwork, C., and Lei, J. (2009), “Differential Privacy and Robust Statistics,” in Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing. Bethesda, MD: ACM, 371–380.
  • Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006), Calibrating Noise to Sensitivity in Private Data Analysis. Berlin: Springer, 265–284.
  • Gaboardi, M., Honaker, J., King, G., Nissim, K., Ullman, J., and Vadhan, S. P. (2016a), “PSI (Ψ): A Private Data Sharing Interface,” arXiv preprint arXiv: 1609.04340.
  • Gaboardi, M., Lim, H., Rogers, R., and Vadhan, S. (2016b), “Differentially Private Chi-Squared Hypothesis Testing: Goodness of Fit and Independence Testing,” arXiv preprint arXiv: 1602.03090.
  • Gomatam, S., Karr, A. F., Reiter, J. P., and Sanil, A. P. (2005), “Data Dissemination and Disclosure Limitation in a World Without Microdata: A Risk-Utility Framework for Remote Access Servers,” Statistical Science, 20, 163–177. DOI: 10.1214/088342305000000043.
  • Honkela, A., Das, M., Dikmen, O., and Kaski, S. (2016), “Efficient Differentially Private Learning Improves Drug Sensitivity Prediction,” arXiv preprint arXiv:1606.02109.
  • Jing, L., Charest, A., Slavkovic, A., Smith, A., and Fienberg, S. (2018), “Differentially Private Model Selection with Penalized and Constrained Likelihood,” Journal of the Royal Statistical Society: Series A, 181, 609–633. DOI: 10.1111/rssa.12324.
  • Karwa, V., Kifer, D., and Slavković, A. B. (2015), “Private Posterior Distributions from Variational Approximations,” arXiv preprint arXiv:1511.07896.
  • Karwa, V., and Vadhan, S. (2017), “Finite Sample Differentially Private Confidence Intervals.” arXiv preprint arXiv:1711.03908.
  • Karwa, V., and Vadhan, S. (2018), “Finite Sample Differentially Private Confidence Intervals,.” in 9th Innovations in Theoretical Computer Science Conference (ITCS 2018), Vol. 94 of Leibniz International Proceedings in Informatics (LIPIcs), A. R. Karlin ed., Dagstuhl: Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 44:1–44:9.
  • Kifer, D., Smith, A., and Thakurta, A. (2012), “Private Convex Empirical Risk Minimization and High-Dimensional Regression,” Journal of Machine Learning Research, 1, 3–1.
  • King, G. (2007), “An Introduction to the Dataverse Network as an Infrastructure for Data Sharing,” Sociological Methods, and Research, 36, 173–199. DOI: 10.1177/0049124107306660.
  • Kinney, S. K., Reiter, J. P., Reznek, A. P., Miranda, J., Jarmin, R. S., and Abowd, J. M. (2011), “Towards Unrestricted Public Use Business Microdata: The Synthetic Longitudinal Business Database,” International Statistical Review, 79, 362–384. DOI: 10.1111/j.1751-5823.2011.00153.x.
  • Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., and Vilhuber, L. (2008), “Privacy: Theory Meets Practice on the Map,” in IEEE 24th International Conference on Data Engineering, 2008 (ICDE 2008). IEEE, 277–286.
  • McClure, D., and Reiter, J. P. (2012), “Differential Privacy and Statistical Disclosure Risk Measures: An Investigation with Binary Synthetic Data,” Trans. Data Privacy, 5, 535–552.
  • Narayanan, A., and Shmatikov, V. (2008), “Robust De-anonymization of Large Sparse Datasets,” in IEEE Symposium on Security and Privacy, 2008 (SP 2008). Oakland, CA: IEEE, 111–125.
  • Nissim, K., Raskhodnikova, S., and Smith, A. (2007), “Smooth Sensitivity and Sampling in Private Data Analysis,” in Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, San Diego, CA: ACM, 75–84.
  • O’Keefe, C., and Chipperfield, J. (2013), “A Summary of Attack Methods and Protective Measures for Fully Automated Remote Analysis Systems,” International Statistical Review, 81 426–455. DOI: 10.1111/insr.12021.
  • O’Keefe, C. M., and Good, N. M. (2009), “Regression Output from a Remote Analysis Server,” Data & Knowledge Engineering, 68, 1175–1186. DOI: 10.1016/j.datak.2009.06.009.
  • Parry, M., and Chase, J. (2011), “Harvard Researchers Accused of Breaching Students’ Privacy,” Chronicle, 1, 30.
  • Raghunathan, T. E., Reiter, J. P., and Rubin, D. B. (2003), “Multiple Imputation for Statistical Disclosure Limitation,” Journal of Official Statistics, 19, 1–17.
  • Reiter, J. P. (2003), “Model Diagnostics for Remote Access Regression Servers,” Statistics and Computing, 13, 371–380.
  • Reiter, J. P. (2005), “Releasing Multiply Imputed, Synthetic Public Use Microdata: An Illustration and Empirical Study,” Journal of the Royal Statistical Society: Series A, 168, 185–205.
  • Reiter, J. P., and Kohnen, C. N. (2005), “Categorical Data Regression Diagnostics for Remote Access Servers,” Journal of Statistical Computation and Simulation, 75, 889–903. DOI: 10.1080/00949650412331299184.
  • Reiter, J. P., Oganian, A., and Karr, A. F. (2009), “Verification Servers: Enabling Analysts to Assess the Quality of Inferences from Public Use Data,” Computational Statistics & Data Analysis, 53, 1475–1482. DOI: 10.1016/j.csda.2008.10.006.
  • Rubin, D. B. (1993), “Discussion: Statistical Disclosure Limitation,” Journal of Official Statistics, 9, 462–468.
  • Sarlós, T. (2006), “Improved Approximation Algorithms for Large Matrices Via Random Projections,” 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), Berkeley, CA. 143–152.
  • Sheffet, O. (2015), “Differentially Private Ordinary Least Squares: t-values, Confidence Intervals and Rejecting Null-hypotheses,” arXiv preprint arXiv:1507.02482.
  • Solea, E. (2014), “Differentially Private Hypothesis Testing For Normal Random Variables,” Ph.D. thesis, The Pennsylvania State University.
  • Sweeney, L. (1997), “Weaving Technology and Policy Together to Maintain Confidentiality,” The Journal of Law, Medicine & Ethics, 25, 98–110.
  • Sweeney, L. (2013), “Matching Known Patients to Health Records in Washington State Data,” Tech. rep. Data Privacy Lab, Harvard University, Cambridge, MA.
  • Van der Vaart, A. W. (2000). Asymptotic Statistics (Cambridge Series in Statistical and Probabilistic Mathematics). Cambridge University Press. Cambridge, MA.
  • Vu, D., and Slavkovic, A. (2009), “Differential Privacy for Clinical Trial Data: Preliminary Evaluations,” in IEEE International Conference on Data Mining Workshops, 2009. (ICDMW’09). Miami, FL: IEEE, 138– 143.
  • Wang, Y., Lee, J., and Kifer, D. (2017), “Differentially Private Hypothesis Testing,” revisited. arXiv preprint arXiv:1511.03376.
  • Wasserman, L., and Zhou, S. (2010). “A Statistical Framework for Differential Privacy,” Journal of the American Statistical Association, 105, 375–389. DOI: 10.1198/jasa.2009.tm08651.
  • Wu, X., Fredrikson, M., Wu, W., Jha, S., and Naughton, J. F. (2015), “Revisiting Differentially Private Regression: Lessons from Learning Theory and Their Consequences,” arXiv preprint arXiv:1512.06388.
  • Zhang, J., Zhang, Z., Xiao, X., Yang, Y., and Winslett, M. (2012), “Functional Mechanism: Regression Analysis Under Differential Privacy,” Proceedings of the VLDB Endowment, 5, 1364–1375. DOI: 10.14778/2350229.2350253.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.