{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:44:17Z","timestamp":1774964657311,"version":"3.50.1"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1109\/icde65448.2025.00257","type":"proceedings-article","created":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T18:28:25Z","timestamp":1755714505000},"page":"3439-3452","source":"Crossref","is-referenced-by-count":2,"title":["Analyzing and Optimizing Perturbation of DP-SGD Geometrically"],"prefix":"10.1109","author":[{"given":"Jiawei","family":"Duan","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University"}]},{"given":"Xinyue","family":"Sun","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology"}]}],"member":"263","reference":[{"key":"ref1","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"30th USENIX Security Symposium (USENIX Security)","author":"Carlini","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/336"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503598"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/3510397.3510404"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3551793.3551798"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648164"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402744"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389140"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3107512"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2023.3288154"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488899"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824067"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407859"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352085"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476277"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486234"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-022-00774-w"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484786"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137804"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14778\/3594512.3594515"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3369184"},{"key":"ref33","article-title":"Stochastic gradient descent","author":"Robbins","year":"1951","journal-title":"Journal of the American Statistical Association"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/5236.001.0001"},{"key":"ref35","article-title":"Understanding the difficulty of training deep feedforward neural networks","author":"Glorot","year":"2010","journal-title":"AISTATS"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_26"},{"key":"ref37","article-title":"On the importance of initialization and momentum in deep learning","author":"Sutskever","year":"2013","journal-title":"ICML"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1406.3269"},{"key":"ref39","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"International Conference on Machine Learning (ICML)","author":"Ioffe","year":"2015"},{"key":"ref40","author":"You","year":"2017","journal-title":"Large batch training of convolutional networks"},{"key":"ref41","article-title":"Lookahead optimizer: k steps forward, 1 step back","author":"Zhang","year":"2019","journal-title":"Neural Information Processing Systems (NIPS)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-024-00845-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648182"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648172"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.14778\/3641204.3641212"},{"key":"ref46","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103066"},{"key":"ref48","article-title":"Differentially private bayesian learning on distributed data","volume-title":"Advances in Neural Information Processing Systems","volume":"30","author":"Heikkila","year":"2017"},{"key":"ref49","article-title":"Understanding clipping for federated learning: Convergence and client-level differential privacy","volume-title":"International Conference on Machine Learning (ICML)","author":"Zhang","year":"2022"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i9.26242"},{"key":"ref51","article-title":"Understanding gradient clipping in private sgd: a geometric perspective","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems, ser. NIPS \u201920","author":"Chen","year":"2020"},{"key":"ref52","first-page":"1631","article-title":"Numerical composition of dif-ferential privacy","volume":"34","author":"Gopi","year":"2021","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i14.29451"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_25"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.5555\/3042817.3043083"},{"key":"ref57","article-title":"How to make the gradients small stochastically: Even faster convex and nonconvex sgd","author":"Yu","year":"2019","journal-title":"Advances in Neural Information Processing Systems (NIPS)"},{"key":"ref58","article-title":"Privacy amplification by iteration","author":"Feng","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref59","volume-title":"Multivariable Calculus and Linear Algebra","author":"Thomas","year":"2006"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6377(84)90008-7"},{"key":"ref61","article-title":"Analyzing and optimizing perturbation of dp-sgd geometrically","volume-title":"Technical Report","author":"Duan","year":"2025"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v1i2.570"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref65","author":"Krizhevsky","year":"2009","journal-title":"Learning multiple layers of features from tiny images"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560562"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648164"},{"key":"ref68","article-title":"Automatic clipping: Differentially private deep learning made easier and stronger","volume":"36","author":"Bu","year":"2023","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14778\/3611540.3611617"}],"event":{"name":"2025 IEEE 41st International Conference on Data Engineering (ICDE)","location":"Hong Kong, Hong Kong","start":{"date-parts":[[2025,5,19]]},"end":{"date-parts":[[2025,5,23]]}},"container-title":["2025 IEEE 41st International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11112833\/11112834\/11113137.pdf?arnumber=11113137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T05:19:25Z","timestamp":1755753565000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11113137\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/icde65448.2025.00257","relation":{},"subject":[],"published":{"date-parts":[[2025,5,19]]}}}