pith. sign in

arxiv: 2507.17544 · v4 · submitted 2025-07-23 · 📊 stat.ML · cs.LG· stat.ME

Optimal differentially private kernel learning with random projection

Pith reviewed 2026-05-19 03:04 UTC · model grok-4.3

classification 📊 stat.ML cs.LGstat.ME
keywords differential privacykernel learningrandom projectionexcess riskempirical risk minimizationdimension reductiongaussian processes
0
0 comments X

The pith

Random projection in kernel space achieves minimax-optimal excess risk under differential privacy.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper presents a differentially private algorithm for kernel empirical risk minimization that relies on random projection in the reproducing kernel Hilbert space using Gaussian processes. This technique is shown to deliver minimax-optimal excess risk rates for squared loss and for Lipschitz-smooth convex losses when local strong convexity holds on the loss. Alternative dimension reduction methods such as random Fourier feature mappings are proven to be suboptimal in terms of excess risk. The analysis yields dimension-free bounds for private linear ERM with objective perturbation and sharper bounds for prior kernel algorithms. A sympathetic reader would care because it identifies a way to maintain statistical optimality while enforcing privacy in kernel methods.

Core claim

On the paper's own terms, the central claim is that the proposed random projection method for differentially private kernel ERM attains the minimax optimal excess risk rates for the squared loss and Lipschitz-smooth convex loss functions under a local strong convexity condition. Existing approaches based on random Fourier features or l2 regularization are suboptimal. The work includes the derivation of dimension-free excess risk bounds for objective perturbation-based private linear ERM without relying on noisy gradient mechanisms, as well as sharper bounds for existing DP kernel ERM algorithms.

What carries the argument

Random projection in the reproducing kernel Hilbert space using Gaussian processes, which performs dimension reduction to balance privacy and statistical performance in the ERM framework.

Load-bearing premise

The local strong convexity condition on the loss function is required to obtain the minimax-optimal rates.

What would settle it

If the excess risk of the proposed method exceeds the minimax rate in an experiment satisfying the local strong convexity condition, that would falsify the optimality.

Figures

Figures reproduced from arXiv: 2507.17544 by Bonwoo Lee, Cheolwoo Park, Jeongyoun Ahn.

Figure 1
Figure 1. Figure 1: Average test errors for DP kernel ridge regression based on random projection [PITH_FULL_IMAGE:figures/full_fig_p022_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: Test errors of DP kernel ridge regression on 20-dimensional synthetic dataset [PITH_FULL_IMAGE:figures/full_fig_p023_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: (a) Test errors of DP kernel ridge regression for Million Song dataset. (b) Test [PITH_FULL_IMAGE:figures/full_fig_p023_3.png] view at source ↗
Figure 4
Figure 4. Figure 4: Test errors of DP kernel ridge regression on the 10-dimensional synthetic dataset [PITH_FULL_IMAGE:figures/full_fig_p099_4.png] view at source ↗
Figure 5
Figure 5. Figure 5: Test errors of DP kernel ridge regression on the 20-dimensional synthetic dataset [PITH_FULL_IMAGE:figures/full_fig_p100_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: Test errors of DP kernel ridge regression on the 30-dimensional synthetic dataset [PITH_FULL_IMAGE:figures/full_fig_p100_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: Test errors of DP kernel ridge regression the Million Song dataset across different [PITH_FULL_IMAGE:figures/full_fig_p101_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: Test errors of DP kernel ridge regression for [PITH_FULL_IMAGE:figures/full_fig_p101_8.png] view at source ↗
Figure 9
Figure 9. Figure 9: Test errors of DP kernel ridge regression for [PITH_FULL_IMAGE:figures/full_fig_p102_9.png] view at source ↗
Figure 10
Figure 10. Figure 10: Test errors of DP kernel ridge regression for [PITH_FULL_IMAGE:figures/full_fig_p102_10.png] view at source ↗
Figure 11
Figure 11. Figure 11: Test errors of DP kernel ridge regression for [PITH_FULL_IMAGE:figures/full_fig_p103_11.png] view at source ↗
Figure 12
Figure 12. Figure 12: Test errors of DP kernel ridge regression for [PITH_FULL_IMAGE:figures/full_fig_p103_12.png] view at source ↗
read the original abstract

Differential privacy has become a cornerstone in the development of privacy-preserving learning algorithms. This work addresses optimizing differentially private kernel learning within the empirical risk minimization (ERM) framework. We propose a novel differentially private kernel ERM algorithm based on random projection in the reproducing kernel Hilbert space using Gaussian processes. Our method achieves minimax-optimal excess risk rates for both the squared loss and Lipschitz-smooth convex loss functions under a local strong convexity condition. We further show that existing approaches based on alternative dimension reduction techniques, such as random Fourier feature mappings or $\ell_2$ regularization, yield suboptimal excess risk bounds. Our key theoretical contribution also includes the derivation of dimension-free excess risk bounds for objective perturbation-based private linear ERM, marking the first such result that does not rely on noisy gradient-based mechanisms. Additionally, we obtain sharper excess risk bounds for existing differentially private kernel ERM algorithms. Empirical evaluations support our theoretical claims, demonstrating that random projection enables statistically efficient and optimally private kernel learning. These findings provide new insights into the design of differentially private algorithms and highlight the central role of dimension reduction in balancing privacy and utility.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 1 minor

Summary. The manuscript proposes a differentially private kernel ERM algorithm that uses random projections in the RKHS induced by Gaussian processes. It claims to achieve minimax-optimal excess risk rates for both squared loss and Lipschitz-smooth convex losses (under a local strong convexity condition), demonstrates suboptimality of alternative dimension-reduction techniques such as random Fourier features and ℓ₂ regularization, derives the first dimension-free excess risk bounds for objective-perturbation private linear ERM, obtains sharper bounds for prior DP kernel ERM methods, and supports the theory with empirical results.

Significance. If the local strong convexity condition is verified to hold after projection and the derivations are complete, the work would be significant for showing that a carefully chosen random projection can attain optimal privacy-utility trade-offs in kernel methods where other reductions do not, while also contributing dimension-free bounds for linear private ERM.

major comments (2)
  1. [Abstract and §4] Abstract and §4 (convex-loss case): the minimax-optimal excess-risk rate for Lipschitz-smooth convex losses is obtained only under the local strong convexity condition; the manuscript invokes this condition to match the lower bound but does not verify that the Gaussian-process random projection preserves the required local curvature in the RKHS, leaving the optimality claim for this loss class unsecured.
  2. [Theorem 5.1] Theorem 5.1 (comparison to random Fourier features): the claimed suboptimality of RFF-based methods is shown via excess-risk bounds, yet the argument appears to rely on a specific scaling of the projection dimension (a free parameter); without an explicit statement that the dimension choice is independent of the privacy parameter or sample size, the separation from the proposed method is not fully load-bearing.
minor comments (1)
  1. [Notation] Notation for the random-projection dimension and the Gaussian-process kernel could be introduced earlier and used consistently to improve readability.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for their careful reading and constructive comments. We address each major comment point by point below, indicating the revisions we will make to strengthen the manuscript.

read point-by-point responses
  1. Referee: [Abstract and §4] Abstract and §4 (convex-loss case): the minimax-optimal excess-risk rate for Lipschitz-smooth convex losses is obtained only under the local strong convexity condition; the manuscript invokes this condition to match the lower bound but does not verify that the Gaussian-process random projection preserves the required local curvature in the RKHS, leaving the optimality claim for this loss class unsecured.

    Authors: We thank the referee for this observation. The local strong convexity condition is invoked to attain the minimax rate for the Lipschitz-smooth convex loss, and we agree that an explicit verification of its preservation after projection is needed to fully secure the claim. In the revised manuscript we will add a new lemma showing that the Gaussian-process random projection preserves local strong convexity in the projected RKHS with high probability, provided the projection dimension satisfies a mild lower bound that remains independent of the privacy parameter. We will also update the abstract and Section 4 to reference this preservation result. revision: yes

  2. Referee: [Theorem 5.1] Theorem 5.1 (comparison to random Fourier features): the claimed suboptimality of RFF-based methods is shown via excess-risk bounds, yet the argument appears to rely on a specific scaling of the projection dimension (a free parameter); without an explicit statement that the dimension choice is independent of the privacy parameter or sample size, the separation from the proposed method is not fully load-bearing.

    Authors: We appreciate the referee's request for clarification. In the analysis underlying Theorem 5.1 the projection dimension for the proposed Gaussian-process method is chosen independently of both the privacy parameter ε and the sample size n (scaling only logarithmically with n). In contrast, matching the same excess-risk bound with random Fourier features requires a dimension that grows with privacy-dependent terms. We will add an explicit remark in the theorem statement and surrounding text stating this independence and thereby reinforcing the separation. revision: yes

Circularity Check

0 steps flagged

No circularity: derivation builds on standard DP-ERM and RKHS bounds with explicit assumptions

full rationale

The paper's central results consist of excess-risk upper bounds derived from random Gaussian-process projection into an RKHS, combined with objective perturbation for privacy. These bounds are obtained under the stated local strong convexity assumption for the convex-loss case; the assumption is introduced explicitly rather than derived from the projection step itself. No equation reduces a claimed prediction to a fitted parameter by construction, no load-bearing uniqueness theorem is imported via self-citation, and no ansatz is smuggled through prior work. The comparison showing alternative dimension-reduction methods are suboptimal follows directly from the same excess-risk analysis applied to those methods. The derivation chain therefore remains self-contained against external benchmarks once the local-strong-convexity hypothesis is granted.

Axiom & Free-Parameter Ledger

1 free parameters · 1 axioms · 0 invented entities

The central claims rest on standard RKHS and differential-privacy background plus one domain assumption; no new invented entities are introduced.

free parameters (1)
  • random projection dimension
    Dimension of the random projection is chosen to balance privacy noise and approximation error in the stated bounds.
axioms (1)
  • domain assumption Local strong convexity of the loss function
    Invoked to derive the minimax-optimal excess risk rates.

pith-pipeline@v0.9.0 · 5725 in / 1113 out tokens · 36473 ms · 2026-05-19T03:04:00.050934+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

70 extracted references · 70 canonical work pages · 1 internal anchor

  1. [1]

    Differentially private assouad, fano, and le cam

    Jayadev Acharya, Ziteng Sun, and Huanyu Zhang. Differentially private assouad, fano, and le cam. In Algorithmic Learning Theory, pages 48--78. PMLR, 2021

  2. [2]

    Database-friendly random projections

    Dimitris Achlioptas. Database-friendly random projections. In Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 274--281, 2001

  3. [3]

    Gaussian inequalities

    Robert J Adler and Jonathan E Taylor. Gaussian inequalities. Random Fields and Geometry, pages 49--64, 2007

  4. [4]

    Differentially private generalized linear models revisited

    Raman Arora, Raef Bassily, Crist \'o bal Guzm \'a n, Michael Menart, and Enayat Ullah. Differentially private generalized linear models revisited. Advances in neural information processing systems, 35: 0 22505--22517, 2022

  5. [5]

    Minimax and adaptive transfer learn- ing for nonparametric classification under distributed differential privacy constraints.arXiv preprint arXiv:2406.20088,

    Arnab Auddy, T Tony Cai, and Abhinav Chakraborty. Minimax and adaptive transfer learning for nonparametric classification under distributed differential privacy constraints. arXiv preprint arXiv:2406.20088, 2024

  6. [6]

    Differentially private database release via kernel mean embeddings

    Matej Balog, Ilya Tolstikhin, and Bernhard Sch \"o lkopf. Differentially private database release via kernel mean embeddings. In International Conference on Machine Learning, pages 414--422. PMLR, 2018

  7. [7]

    Rademacher and gaussian complexities: Risk bounds and structural results

    Peter L Bartlett and Shahar Mendelson. Rademacher and gaussian complexities: Risk bounds and structural results. Journal of Machine Learning Research, 3 0 (Nov): 0 463--482, 2002

  8. [8]

    Differentially private learning with margin guarantees

    Raef Bassily, Mehryar Mohri, and Ananda Theertha Suresh. Differentially private learning with margin guarantees. Advances in Neural Information Processing Systems, 35: 0 32127--32141, 2022 a

  9. [9]

    Differentially private learning with margin guarantees

    Raef Bassily, Mehryar Mohri, and Ananda Theertha Suresh. Differentially private learning with margin guarantees. In S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh, editors, Advances in Neural Information Processing Systems, volume 35, pages 32127--32141. Curran Associates, Inc., 2022 b . URL https://proceedings.neurips.cc/paper_files/pa...

  10. [10]

    Year Prediction MSD

    T. Bertin-Mahieux. Year Prediction MSD . UCI Machine Learning Repository, 2011. DOI : https://doi.org/10.24432/C50K61

  11. [11]

    The cost of privacy: Optimal rates of convergence for parameter estimation with differential privacy

    T Tony Cai, Yichen Wang, and Linjun Zhang. The cost of privacy: Optimal rates of convergence for parameter estimation with differential privacy. The Annals of Statistics, 49 0 (5): 0 2825--2850, 2021

  12. [12]

    Optimal federated learning for non- parametric regression with heterogeneous distributed differential privacy constraints.arXiv preprint arXiv:2406.06755,

    T Tony Cai, Abhinav Chakraborty, and Lasse Vuursteen. Optimal federated learning for nonparametric regression with heterogeneous distributed differential privacy constraints. arXiv preprint arXiv:2406.06755, 2024

  13. [13]

    Optimal rates for the regularized least-squares algorithm

    Andrea Caponnetto and Ernesto De Vito. Optimal rates for the regularized least-squares algorithm. Foundations of Computational Mathematics, 7: 0 331--368, 2007

  14. [14]

    The secret sharer: Evaluating and testing unintended memorization in neural networks

    Nicholas Carlini, Chang Liu, \'U lfar Erlingsson, Jernej Kos, and Dawn Song. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th USENIX Security Symposium (USENIX Security 19), pages 267--284, Santa Clara, CA, 2019. USENIX Association. ISBN 978-1-939133-06-9. URL https://www.usenix.org/conference/usenixsecurity19/...

  15. [15]

    Differentially private empirical risk minimization

    Kamalika Chaudhuri, Claire Monteleoni, and Anand D Sarwate. Differentially private empirical risk minimization. Journal of Machine Learning Research, 12 0 (3), 2011

  16. [16]

    Support vector machines

    Andreas Christmann and Ingo Steinwart. Support vector machines. Springer, 2008

  17. [17]

    Gaussian differential privacy

    Jinshuo Dong, Aaron Roth, and Weijie J Su. Gaussian differential privacy. Journal of the Royal Statistical Society Series B: Statistical Methodology, 84: 0 3--37, 2022

  18. [18]

    Duchi, Michael I

    John C. Duchi, Michael I. Jordan, and Martin J. Wainwright. Local privacy and statistical minimax rates. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 429--438, 2013

  19. [19]

    Our data, ourselves: Privacy via distributed noise generation

    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings 25. Springer, 2006 a

  20. [20]

    Calibrating noise to sensitivity in private data analysis

    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography: Third Theory of Cryptography Conference, Proceedings 3, pages 265--284. Springer, 2006 b

  21. [22]

    Model inversion attacks that exploit confidence information and basic countermeasures

    Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, page 1322–1333, New York, NY, USA, 2015 b . Association for Computing Machinery. ISBN 9781450338325. URL https://doi.or...

  22. [23]

    Differential privacy for functions and functional data

    Rob Hall, Alessandro Rinaldo, and Larry Wasserman. Differential privacy for functions and functional data. J. Mach. Learn. Res., 14 0 (1): 0 703–727, 2013. ISSN 1532-4435

  23. [24]

    Dp-merf: Differentially private mean embeddings with randomfeatures for practical privacy-preserving data generation

    Frederik Harder, Kamil Adamczewski, and Mijung Park. Dp-merf: Differentially private mean embeddings with randomfeatures for practical privacy-preserving data generation. In International conference on artificial intelligence and statistics, pages 1819--1827. PMLR, 2021

  24. [25]

    Differentially private learning with kernels

    Prateek Jain and Abhradeep Thakurta. Differentially private learning with kernels. In International conference on machine learning, pages 118--126. PMLR, 2013

  25. [26]

    \"U ber lineare methoden in der wahrscheinlichkeitsrechnung

    Kari Karhunen. \"U ber lineare methoden in der wahrscheinlichkeitsrechnung. Ann Acad Sci Fennicae, 37: 0 1, 1947

  26. [27]

    Finite Sample Differentially Private Confidence Intervals

    Vishesh Karwa and Salil Vadhan. Finite Sample Differentially Private Confidence Intervals . In Anna R. Karlin, editor, 9th Innovations in Theoretical Computer Science Conference (ITCS 2018), volume 94 of Leibniz International Proceedings in Informatics (LIPIcs), pages 44:1--44:9, Dagstuhl, Germany, 2018. Schloss Dagstuhl -- Leibniz-Zentrum f \"u r Informa...

  27. [28]

    Private convex empirical risk minimization and high-dimensional regression

    Daniel Kifer, Adam Smith, and Abhradeep Thakurta. Private convex empirical risk minimization and high-dimensional regression. In Proceedings of the 25th Annual Conference on Learning Theory, volume 23, pages 25.1--25.40, 2012

  28. [29]

    Concentration inequalities and moment bounds for sample covariance operators

    Vladimir Koltchinskii and Karim Lounici. Concentration inequalities and moment bounds for sample covariance operators . Bernoulli, 23 0 (1): 0 110 -- 133, 2017. URL https://doi.org/10.3150/15-BEJ730

  29. [30]

    Koltchinskii, Random Matrix Approximation of Spectral Projection Operators: Ap- plications to Kernel PCA, Annals of Statistics , vol

    B. Laurent and P. Massart. Adaptive estimation of a quadratic functional by model selection . The Annals of Statistics, 28 0 (5): 0 1302 -- 1338, 2000. URL https://doi.org/10.1214/aos/1015957395

  30. [31]

    Minimax risks and optimal procedures for estimation under functional local differential privacy

    Bonwoo Lee, Jeongyoun Ahn, and Cheolwoo Park. Minimax risks and optimal procedures for estimation under functional local differential privacy. In A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, editors, Advances in Neural Information Processing Systems, volume 36, pages 57964--57975. Curran Associates, Inc., 2023. URL https://proceedi...

  31. [32]

    Differential privacy in scalable general kernel learning via k-means nyström random features

    Bonwoo Lee, Jeongyoun Ahn, and Cheolwoo Park. Differential privacy in scalable general kernel learning via k-means nyström random features. In A. Globerson, L. Mackey, D. Belgrave, A. Fan, U. Paquet, J. Tomczak, and C. Zhang, editors, Advances in Neural Information Processing Systems, volume 37, pages 21141--21171. Curran Associates, Inc., 2024. URL https...

  32. [33]

    Towards sharp analysis for distributed learning with random features

    Jian Li and Yong Liu. Towards sharp analysis for distributed learning with random features. In Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI '23, 2023. ISBN 978-1-956792-03-4. URL https://doi.org/10.24963/ijcai.2023/436

  33. [34]

    Optimal rates for distributed learning with random features

    Jian Li, Yong Liu, and Weiping Wang. Optimal rates for distributed learning with random features. In Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI), 2022

  34. [35]

    On the asymptotic learning curves of kernel ridge regression under power-law decay

    Yicheng Li, haobo Zhang, and Qian Lin. On the asymptotic learning curves of kernel ridge regression under power-law decay. In A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, editors, Advances in Neural Information Processing Systems, volume 36, pages 49341--49364. Curran Associates, Inc., 2023 a . URL https://proceedings.neurips.cc/pa...

  35. [36]

    Kernel interpolation generalizes poorly

    Yicheng Li, Haobo Zhang, and Qian Lin. Kernel interpolation generalizes poorly. Biometrika, 111 0 (2): 0 715--722, 08 2023 b . ISSN 1464-3510. URL https://doi.org/10.1093/biomet/asad048

  36. [37]

    Distributed learning of conditional quantiles in the reproducing kernel hilbert space

    Heng Lian. Distributed learning of conditional quantiles in the reproducing kernel hilbert space. In S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh, editors, Advances in Neural Information Processing Systems, volume 35, pages 11686--11696. Curran Associates, Inc., 2022. URL https://proceedings.neurips.cc/paper_files/paper/2022/file/4c12...

  37. [38]

    Random features for kernel approximation: A survey on algorithms, theory, and beyond

    Fanghui Liu, Xiaolin Huang, Yudong Chen, and Johan AK Suykens. Random features for kernel approximation: A survey on algorithms, theory, and beyond. IEEE Transactions on Pattern Analysis and Machine Intelligence, 44 0 (10): 0 7128--7148, 2021

  38. [39]

    Improved analysis of supervised learning in the rkhs with random features: Beyond least squares

    Jiamin Liu, Lei Wang, and Heng Lian. Improved analysis of supervised learning in the rkhs with random features: Beyond least squares. Neural Networks, 184: 0 107091, 2025

  39. [40]

    Linear regression with random projections

    Odalric Maillard and R \'e mi Munos. Linear regression with random projections. Journal of Machine Learning Research, 13 0 (1): 0 2735--2772, 2012

  40. [41]

    Generalization error bounds for bayesian mixture algorithms

    Ron Meir and Tong Zhang. Generalization error bounds for bayesian mixture algorithms. Journal of Machine Learning Research, 4 0 (Oct): 0 839--860, 2003

  41. [42]

    Exploiting unintended feature leakage in collaborative learning

    Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. Exploiting unintended feature leakage in collaborative learning. In 2019 IEEE Symposium on Security and Privacy (SP), pages 691--706, 2019

  42. [43]

    Regularization in kernel learning

    Shahar Mendelson and Joseph Neeman. Regularization in kernel learning . The Annals of Statistics, 38 0 (1): 0 526 -- 565, 2010. URL https://doi.org/10.1214/09-AOS728

  43. [44]

    Efficient P rivate A lgorithms for L earning L arge- M argin H alfspaces

    Huy L\^ e Nguy\ \^ e n, Jonathan Ullman, and Lydia Zakynthinou. Efficient P rivate A lgorithms for L earning L arge- M argin H alfspaces. In Aryeh Kontorovich and Gergely Neu, editors, Proceedings of the 31st International Conference on Algorithmic Learning Theory, volume 117 of Proceedings of Machine Learning Research, pages 704--724. PMLR, 08 Feb--11 Fe...

  44. [45]

    The geometry of differential privacy: the sparse and approximate cases

    Aleksandar Nikolov, Kunal Talwar, and Li Zhang. The geometry of differential privacy: the sparse and approximate cases. In Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, STOC '13, page 351–360, 2013

  45. [46]

    Efficient differentially private kernel support vector classifier for multi-class classification

    Jinseong Park, Yujin Choi, Junyoung Byun, Jaewook Lee, and Saerom Park. Efficient differentially private kernel support vector classifier for multi-class classification. Information Sciences, 619: 0 889--907, 2023

  46. [47]

    Privacy-preserving deep learning: Revisited and enhanced

    Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, and Shiho Moriai. Privacy-preserving deep learning: Revisited and enhanced. In Lynn Batten, Dong Seong Kim, Xuyun Zhang, and Gang Li, editors, Applications and Techniques in Information Security, pages 100--110, Singapore, 2017. Springer Singapore. ISBN 978-981-10-5421-1

  47. [48]

    Random features for large-scale kernel machines

    Ali Rahimi and Benjamin Recht. Random features for large-scale kernel machines. Advances in neural information processing systems, 20, 2007

  48. [49]

    Noise-aware differentially private regression via meta-learning

    Ossi R \"a is \"a , Stratis Markou, Matthew Ashman, Wessel Bruinsma, Marlon Tobaben, Antti Honkela, and Richard Turner. Noise-aware differentially private regression via meta-learning. Advances in Neural Information Processing Systems, 37: 0 63873--63907, 2024

  49. [50]

    A differentially private kernel two-sample test

    Anant Raj, Ho Chung Leon Law, Dino Sejdinovic, and Mijung Park. A differentially private kernel two-sample test. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pages 697--724. Springer, 2019

  50. [51]

    Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism

    Sofya Raskhodnikova and Adam Smith. Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 495--504, 2016

  51. [52]

    Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning

    Benjamin IP Rubinstein, Peter L Bartlett, Ling Huang, and Nina Taft. Learning in a large function space: Privacy-preserving mechanisms for svm learning. arXiv preprint arXiv:0911.5708, 2009

  52. [53]

    Generalization properties of learning with random features

    Alessandro Rudi and Lorenzo Rosasco. Generalization properties of learning with random features. In I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett, editors, Advances in Neural Information Processing Systems, volume 30. Curran Associates, Inc., 2017. URL https://proceedings.neurips.cc/paper_files/paper/2017/file...

  53. [54]

    Learning with kernels: support vector machines, regularization, optimization, and beyond

    Bernhard Scholkopf and Alexander J Smola. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press, 2018

  54. [55]

    Membership inference attacks against machine learning models

    Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP), pages 3--18, 2017

  55. [56]

    Differentially private regression with gaussian processes

    Michael T Smith, Mauricio A \'A lvarez, Max Zwiessele, and Neil D Lawrence. Differentially private regression with gaussian processes. In International Conference on Artificial Intelligence and Statistics, pages 1195--1203. PMLR, 2018

  56. [57]

    Differentially private regression and classification with sparse gaussian processes

    Michael Thomas Smith, Mauricio A \'A lvarez, and Neil D Lawrence. Differentially private regression and classification with sparse gaussian processes. Journal of Machine Learning Research, 22 0 (188): 0 1--41, 2021

  57. [58]

    Machine learning models that remember too much

    Congzheng Song, Thomas Ristenpart, and Vitaly Shmatikov. Machine learning models that remember too much. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, page 587–601, New York, NY, USA, 2017. Association for Computing Machinery. ISBN 9781450349468. URL https://doi.org/10.1145/3133956.3134077

  58. [59]

    Characterizing private clipped gradient descent on convex generalized linear problems

    Shuang Song, Om Thakkar, and Abhradeep Thakurta. Characterizing private clipped gradient descent on convex generalized linear problems. arXiv preprint arXiv:2006.06783, 2020

  59. [60]

    Optimal rates for regularized least squares regression

    Ingo Steinwart, Don Hush, and Clint Scovel. Optimal rates for regularized least squares regression. 01 2009

  60. [61]

    Mercer theorem for rkhs on noncompact sets

    Hongwei Sun. Mercer theorem for rkhs on noncompact sets. Journal of Complexity, 21 0 (3): 0 337--349, 2005. ISSN 0885-064X. URL https://www.sciencedirect.com/science/article/pii/S0885064X04000822

  61. [62]

    High-dimensional probability: An introduction with applications in data science, volume 47

    Roman Vershynin. High-dimensional probability: An introduction with applications in data science, volume 47. Cambridge university press, 2018

  62. [63]

    Fast private kernel density estimation via locality sensitive quantization

    Tal Wagner, Yonatan Naamad, and Nina Mishra. Fast private kernel density estimation via locality sensitive quantization. In International Conference on Machine Learning, pages 35339--35367. PMLR, 2023

  63. [64]

    Privacy-preserving q-learning with functional noise in continuous spaces

    Baoxiang Wang and Nidhi Hegde. Privacy-preserving q-learning with functional noise in continuous spaces. Advances in Neural Information Processing Systems, 32, 2019

  64. [65]

    Optimal kernel quantile learning with random features

    Caixing Wang and Xingdong Feng. Optimal kernel quantile learning with random features. In Ruslan Salakhutdinov, Zico Kolter, Katherine Heller, Adrian Weller, Nuria Oliver, Jonathan Scarlett, and Felix Berkenkamp, editors, Proceedings of the 41st International Conference on Machine Learning, volume 235 of Proceedings of Machine Learning Research, pages 504...

  65. [66]

    Towards theoretical understanding of learning large-scale dependent data via random features

    Chao Wang, Xin Bing, Caixing Wang, et al. Towards theoretical understanding of learning large-scale dependent data via random features. In Forty-first International Conference on Machine Learning, 2024

  66. [67]

    Differentially private sgd with random features

    Yi-guang Wang and Zheng-chu Guo. Differentially private sgd with random features. Applied Mathematics-A Journal of Chinese Universities, 39 0 (1): 0 1--23, 2024

  67. [68]

    Revisiting differentially private linear regression: optimal and adaptive prediction & estimation in unbounded domain

    Yu-Xiang Wang. Revisiting differentially private linear regression: optimal and adaptive prediction & estimation in unbounded domain. In Uncertainty in Artificial Intelligence (UAI-18), 2018

  68. [69]

    Beyond inferring class representatives: User-level privacy leakage from federated learning

    Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, and Hairong Qi. Beyond inferring class representatives: User-level privacy leakage from federated learning. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pages 2512--2520, 2019

  69. [70]

    Wainwright

    Yun Yang, Mert Pilanci, and Martin J. Wainwright. Randomized sketches for kernels: Fast and optimal nonparametric regression . The Annals of Statistics, 45 0 (3): 0 991 -- 1023, 2017. URL https://doi.org/10.1214/16-AOS1472

  70. [71]

    Online performative gradient descent for learning nash equilibria in decision-dependent games

    Zihan Zhu, Ethan Fang, and Zhuoran Yang. Online performative gradient descent for learning nash equilibria in decision-dependent games. In A. Oh, T. Naumann, A. Globerson, K. Saenko, M. Hardt, and S. Levine, editors, Advances in Neural Information Processing Systems, volume 36, pages 47902--47913. Curran Associates, Inc., 2023. URL https://proceedings.neu...