pith. machine review for the scientific record. sign in

arxiv: 2605.09054 · v1 · submitted 2026-05-09 · 💻 cs.DB · cs.CR· cs.IR

Recognition: 2 theorem links

· Lean Theorem

Personalized w-Event Privacy for Infinite Stream Estimation

Authors on Pith no claims yet

Pith reviewed 2026-05-12 01:49 UTC · model grok-4.3

classification 💻 cs.DB cs.CRcs.IR
keywords personalized differential privacyw-event privacyinfinite data streamsstream estimationprivacy budget managementsliding windowdata stream privacy
0
0 comments X

The pith

Methods for personalized w-event privacy on infinite streams achieve user-specific guarantees and reduce estimation errors by at least 53.6%.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper addresses the limitation of uniform privacy levels in w-event privacy for infinite data streams by enabling each user to set their own per-time privacy requirements. It introduces the Personalized Window Size Mechanism to support varying privacy at individual time slots, then develops Personalized Budget Distribution and Absorption techniques to manage budgets across sliding windows while meeting the (w, E)-EPDP definition. Dynamic variants allow users to change requirements over time under an extended privacy model. The work proves that the mechanisms deliver the claimed privacy guarantees and derives corresponding upper bounds on estimation error for stream statistics. Experiments demonstrate that these approaches lower error by at least 53.6% relative to prior algorithms that assume homogeneous privacy needs.

Core claim

The central claim is that the Personalized Window Size Mechanism together with PBD/PBA and their dynamic DPBD/DPBA extensions satisfy (w, E)-EPDP and the time-varying (τ, w_B, w_F)-Event (E_B, E_F)-PDP definitions for infinite streams, while supplying explicit error upper bounds that are realized in practice as at least a 53.6% error reduction versus existing methods.

What carries the argument

The Personalized Budget Distribution (PBD) and Personalized Budget Absorption (PBA) strategies, which reserve future budgets at least as large as prior consumption and reuse unused budgets from adjacent slots to optimize utility under user-specific E values.

Load-bearing premise

Users can accurately specify and dynamically adjust their per-time privacy requirements E, and the system can perform budget absorption and distribution without violating the sliding-window model.

What would settle it

Running the proposed methods on real infinite-stream datasets and finding either a violation of the stated personalized differential privacy guarantees or an estimation error reduction below 53.6% compared with state-of-the-art uniform-privacy algorithms.

Figures

Figures reproduced from arXiv: 2605.09054 by Kenli Li, Lei Chen, Leilei Du, Peng Cheng, Wei Xi, Xuemin Lin, Xu Zhou.

Figure 1
Figure 1. Figure 1: Different event window sizes for different time slots. [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: A null/non-null publication example. Definition 15 (Skipped/Nullified Publication). The skipped publications are those null publications with dis ≤ √ err. Given a privacy budget requirement E and a window size w, a budget share ϵ¯ = E/w is defined as the average privacy budget per time slot. When publishing new obfuscated data consumes x budget shares (x > 1), in order to maintain the average value, the fo… view at source ↗
Figure 3
Figure 3. Figure 3: A skipped/nullified publication example. [PITH_FULL_IMAGE:figures/full_fig_p010_3.png] view at source ↗
Figure 5
Figure 5. Figure 5: A process example for PBD. for all users. At time slot 3, ϵ (2) 1,3 = (E1/2 − ϵ (2) 1,1 )/2 = E1/8. The vector below each matrix in [PITH_FULL_IMAGE:figures/full_fig_p011_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: A process example for PBA. Memory Complexity Analysis. For PBD and PBA, we have Theorem 2 as follows. Theorem 2 Both PBD and PBA have memory complexity O(n · wmax). Proof For the process of OBS, the memory complexity is O(m). For each one of the n users in both PBD and PBA, each user requires storing at most wmax window-related states. Thus, the memory complexity is O(n · wmax). Scalability Discussion. The… view at source ↗
Figure 7
Figure 7. Figure 7: An example for the forward feasibility condition. [PITH_FULL_IMAGE:figures/full_fig_p014_7.png] view at source ↗
Figure 8
Figure 8. Figure 8: An example for DPBD Dynamic Personalized Budget Absorption. DPBA en￾hances PBA by supporting dynamic privacy requirements for users. Similar to DPBD, DPBA consists of two sub￾mechanisms: PartDC and PartNOP. The private dissimilarity calculation in PartDC remains identical to DPBD. In PartNOP, the system determines whether to nullify the current time slot t for each user ui based on publication budget usage… view at source ↗
Figure 9
Figure 9. Figure 9: An example for DPBA [PITH_FULL_IMAGE:figures/full_fig_p016_9.png] view at source ↗
Figure 10
Figure 10. Figure 10: Illustration of Real datasets. parameters are fixed. The probability functions we use are as follows: – TLNS function. In TLNS, pt = pt−1 + N (0, Q), where N (0, Q) is Gaussian noise with standard variance √ Q = 0.0025. We set p0 = 0.05 as the initial value. If pt < 0, we set pt = 0; If pt > 1, we set pt = 1. For reproducibility, the Gaussian perturbation in TLNS is generated using Java Random with a fixe… view at source ↗
Figure 11
Figure 11. Figure 11: Average Mean Relative Error (AMRE) with ratio for privacy budget varied. BD BA PBD PBA 0.1 0.3 0.5 0.7 0.9 o of wk=40 6 7 ln(AMRE) (a) Taxi 0.1 0.3 0.5 0.7 0.9 o of wk=40 7 8 ln(AMRE) (b) Foursquare 0.1 0.3 0.5 0.7 0.9 o of wk=40 10 15 ln(AMRE) (c) TLNS 0.1 0.3 0.5 0.7 0.9 o of wk=40 10 15 ln(AMRE) (d) Sin 0.1 0.3 0.5 0.7 0.9 o of wk=40 10 15 ln(AMRE) (e) Log [PITH_FULL_IMAGE:figures/full_fig_p023_11.png] view at source ↗
Figure 12
Figure 12. Figure 12: Average Mean Relative Error (AMRE) with ratio for window size varied. budget of Ek = 0.6. We observe that as the users’ quantity ratio increases, the AMRE remains relatively stable. How￾ever, when the users’ quantity ratio of Ek = 1.0 or wk = 40 exceeds 0.8, we can see a significant decrease in AMRE for PBD and PBA. This occurs because when the ratios sur￾passes a certain threshold, the optimal budget fro… view at source ↗
Figure 13
Figure 13. Figure 13: The average running time per time slot with [PITH_FULL_IMAGE:figures/full_fig_p026_13.png] view at source ↗
Figure 14
Figure 14. Figure 14: The average running time per time slot with [PITH_FULL_IMAGE:figures/full_fig_p026_14.png] view at source ↗
Figure 15
Figure 15. Figure 15: Average Jensen-Shannon Divergencee (AJSD) with E varied. releases. In contrast, PBD/DPBD allocate privacy budgets in a more responsive manner, which leads to lower pointwise estimation error. For AJSD, the trends are not always identical to those observed for AMRE. This is expected because AMRE measures pointwise estima￾tion accuracy, whereas AJSD evaluates similarity between the released and true distrib… view at source ↗
Figure 16
Figure 16. Figure 16: Average Jensen-Shannon Divergencee (AJSD) with w varied. BD BA PBD PBA DPBD DPBA 2 20 38 56 74 d 6 8 ln(AMRE) (a) Taxi 2 20 38 56 74 d 5.0 7.5 10.0 ln(AMRE) (b) Foursquare 2 20 38 56 74 d 4 5 6 ln(AJSD) (c) Taxi 2 20 38 56 74 d 4 5 6 ln(AJSD) (d) Foursquare [PITH_FULL_IMAGE:figures/full_fig_p027_16.png] view at source ↗
Figure 17
Figure 17. Figure 17: AMRE and AJSD with d varied. Therefore, for any t ≥ 1, we have: Xt k=tL ϵ (2) i,k ≤ Ei 2 . (10) According to the Composition Theorems [19] and Equation (7) and Equation (10), we have: Xt k=tL ϵi,k = Xt k=tL ϵ (1) i,k + Xt k=tL ϵ (2) i,k ≤ Ei. For any user ui and any two wi-neighboring stream prefixes St and S ′ t (i.e., St ∼wi S ′ t ), let ts be the earliest time slot where St[ts] ̸= S ′ t [ts] and te be … view at source ↗
Figure 18
Figure 18. Figure 18: illustrates an example where si = 3 and wi = 9 [PITH_FULL_IMAGE:figures/full_fig_p027_18.png] view at source ↗
Figure 19
Figure 19. Figure 19: An example of the publication budget lower bound in PBA. [PITH_FULL_IMAGE:figures/full_fig_p029_19.png] view at source ↗
Figure 20
Figure 20. Figure 20: An example of backward privacy budget bounds, where [PITH_FULL_IMAGE:figures/full_fig_p030_20.png] view at source ↗
read the original abstract

In applications such as event monitoring, log analysis, and video querying, $w$-event privacy protects individual data within a sliding time window while supporting accurate stream statistics. Existing studies on infinite data streams mainly assume homogeneous privacy requirements for all users, which cannot capture user-specific privacy preferences. This paper studies personalized $w$-event privacy for private data stream estimation. We first design the Personalized Window Size Mechanism (PWSM), which supports personalized privacy requirements at each time slot. Based on PWSM, we propose Personalized Budget Distribution (PBD) and Personalized Budget Absorption (PBA) to estimate streaming statistics under $\boldsymbol{w}$-Event $\boldsymbol{\mathcal{E}}$ Personalized Differential Privacy (($\boldsymbol{w}$, $\boldsymbol{\mathcal{E}}$)-EPDP). PBD guarantees that the budget reserved for the next time step is no smaller than the budget consumed in the previous release, while PBA improves the current budget by absorbing unused budgets from the previous $k$ time slots and borrowing from the next $k$ time slots. We further develop Dynamic Personalized Budget Distribution (DPBD) and Dynamic Personalized Budget Absorption (DPBA), which allow users to dynamically adjust privacy requirements while satisfying $(\tau, \boldsymbol{w}_B, \boldsymbol{w}_F)$-Event $(\boldsymbol{\mathcal{E}}_B, \boldsymbol{\mathcal{E}}_F)$-Personalized Differential Privacy. We prove that all proposed methods achieve the corresponding personalized differential privacy guarantees and derive their error upper bounds. Experiments show that our methods reduce estimation error by at least $53.6\%$ compared with state-of-the-art algorithms.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper proposes mechanisms for personalized w-event differential privacy on infinite data streams: Personalized Window Size Mechanism (PWSM), Personalized Budget Distribution (PBD), Personalized Budget Absorption (PBA), and their dynamic variants DPBD and DPBA. It claims to prove that these achieve the corresponding (w, E)-EPDP and (τ, w_B, w_F)-Event (E_B, E_F)-EPDP guarantees, derives error upper bounds, and reports that experiments reduce estimation error by at least 53.6% versus state-of-the-art algorithms.

Significance. If the privacy proofs and error bounds hold under arbitrary dynamic E adjustments in infinite streams, the work would meaningfully extend homogeneous w-event privacy to user-specific and time-varying requirements, which is relevant for applications like event monitoring and log analysis. The budget absorption/borrowing approach and dynamic support are technically interesting extensions of standard DP composition, but their load-bearing correctness under sliding-window re-accounting remains to be confirmed.

major comments (2)
  1. [Abstract / DPBD/DPBA section] Abstract and DPBD/DPBA definitions: the claim that DPBD/DPBA satisfy (τ, w_B, w_F)-Event (E_B, E_F)-EPDP while allowing arbitrary per-time E_t changes is load-bearing. PBA-style absorption borrows from the next k slots; when E_t is later tightened, the privacy loss summed over every sliding w-window must still be re-bounded using the new E values. The provided abstract does not indicate whether the proof explicitly handles non-monotonic E sequences or only fixed/monotonic E.
  2. [Error upper bounds section] Error-bound derivations: the upper bounds are stated to hold for the proposed methods, but the weakest assumption (accurate user-specified E and system-level budget absorption without violating the sliding-window model) directly affects whether the derived bounds remain valid after dynamic changes. If the bounds rely on pre-change E values, they may not compose correctly post-adjustment.
minor comments (2)
  1. [Experiments] Experiments: the 53.6% error reduction is a strong claim; the manuscript should explicitly state data exclusion rules, full experimental setup, and whether post-hoc budget rules were applied, to allow independent verification.
  2. [Notation and definitions] Notation: ensure consistent boldface for vector quantities (w, E, etc.) throughout and clarify the relationship between w-event and the (τ, w_B, w_F) variant.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive feedback. We address the major comments below with clarifications on the dynamic privacy guarantees and error bounds. Revisions will be made to improve explicitness where the abstract and sections could better highlight the handling of arbitrary E sequences.

read point-by-point responses
  1. Referee: [Abstract / DPBD/DPBA section] Abstract and DPBD/DPBA definitions: the claim that DPBD/DPBA satisfy (τ, w_B, w_F)-Event (E_B, E_F)-EPDP while allowing arbitrary per-time E_t changes is load-bearing. PBA-style absorption borrows from the next k slots; when E_t is later tightened, the privacy loss summed over every sliding w-window must still be re-bounded using the new E values. The provided abstract does not indicate whether the proof explicitly handles non-monotonic E sequences or only fixed/monotonic E.

    Authors: The proofs for DPBD and DPBA (Theorems 4.3 and 4.4) are formulated to support arbitrary non-monotonic E_t sequences. The (τ, w_B, w_F)-Event (E_B, E_F)-EPDP definition requires that the total privacy loss over any sliding window of size w is bounded by the sum of the E values active in that window at the time of each release. PBA's absorption and borrowing are re-accounted at every step using the current E_t; when a later tightening occurs, the composition theorem is applied to the realized sequence of E values, ensuring the window sums remain within the new bounds. The abstract will be revised to explicitly note that the guarantees and proofs hold for non-monotonic adjustments. revision: partial

  2. Referee: [Error upper bounds section] Error-bound derivations: the upper bounds are stated to hold for the proposed methods, but the weakest assumption (accurate user-specified E and system-level budget absorption without violating the sliding-window model) directly affects whether the derived bounds remain valid after dynamic changes. If the bounds rely on pre-change E values, they may not compose correctly post-adjustment.

    Authors: The error upper bounds (Section 5) are expressed directly in terms of the per-step E_t values and the actual budgets consumed or absorbed at each release. Because the mechanisms update budgets using the current E_t before each perturbation, the bounds are recomputed with the realized E sequence and remain valid after any adjustment. The derivations rely on the post-adjustment E values for composition, not pre-change values, so the sliding-window model is preserved. A clarifying sentence will be added to the error-bounds section to state this explicitly. revision: partial

Circularity Check

0 steps flagged

No significant circularity; derivations rely on standard DP composition

full rationale

The paper defines new mechanisms (PWSM, PBD, PBA, DPBD, DPBA) for personalized w-event privacy and states that it proves the corresponding (w, E)-EPDP and (τ, w_B, w_F)-Event (E_B, E_F)-EPDP guarantees while deriving error upper bounds. These proofs are presented as direct applications of differential privacy composition and budget accounting rules rather than self-definitions, fitted inputs renamed as predictions, or load-bearing self-citations. No equations reduce the claimed guarantees to the input privacy parameters by construction, and the experimental error reduction is an empirical outcome separate from the formal claims. The derivation chain remains self-contained against external DP benchmarks.

Axiom & Free-Parameter Ledger

0 free parameters · 2 axioms · 0 invented entities

Builds on standard differential privacy composition and sliding-window models from prior work; no new free parameters or invented entities are introduced in the abstract.

axioms (2)
  • standard math Standard differential privacy composition theorems for sequential releases
    Invoked to combine per-slot privacy budgets into overall (w, E)-EPDP guarantee.
  • domain assumption Sliding window model for infinite streams with w-event privacy
    Assumed as the base setting for all mechanisms.

pith-pipeline@v0.9.0 · 5602 in / 1209 out tokens · 36843 ms · 2026-05-12T01:49:00.521828+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

48 extracted references · 48 canonical work pages

  1. [1]

    Heteroge- neous differential privacy.J

    ALAGGAN, M., GAMBS, S.,ANDKERMARREC, A. Heteroge- neous differential privacy.J. Priv. Confidentiality 7, 2 (2016)

  2. [2]

    E., BORDENABE, N

    ANDR ´ES, M. E., BORDENABE, N. E., CHATZIKOKOLAKIS, K., ANDPALAMIDESSI, C. Geo-indistinguishability: differential pri- vacy for location-based systems. In2013 ACM SIGSAC Confer- ence on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013(2013), A. Sadeghi, V . D. Gligor, and M. Yung, Eds., ACM, pp. 901–914

  3. [3]

    CGM: an en- hanced mechanism for streaming data collection with local differ- ential privacy.Proc

    BAO, E., YANG, Y., XIAO, X.,ANDDING, B. CGM: an en- hanced mechanism for streaming data collection with local differ- ential privacy.Proc. VLDB Endow. 14, 11 (2021), 2258–2270

  4. [4]

    BASSILY, R.,ANDSMITH, A. D. Local, private, efficient proto- cols for succinct histograms. InProceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015(2015), R. A. Servedio and R. Rubinfeld, Eds., ACM, pp. 127–135

  5. [5]

    A learning theory ap- proach to non-interactive database privacy

    BLUM, A., LIGETT, K.,ANDROTH, A. A learning theory ap- proach to non-interactive database privacy. InProceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008(2008), pp. 609–618

  6. [6]

    Private decayed predicate sums on streams

    BOLOT, J., FAWAZ, N., MUTHUKRISHNAN, S., NIKOLOV, A., ANDTAFT, N. Private decayed predicate sums on streams. InJoint 2013 EDBT/ICDT Conferences, ICDT ’13 Proceedings, Genoa, Italy, March 18-22, 2013(2013), pp. 284–295

  7. [7]

    H., SHI, E.,ANDSONG, D

    CHAN, T. H., SHI, E.,ANDSONG, D. Private and continual release of statistics.ACM Trans. Inf. Syst. Secur. 14, 3 (2011), 26:1–26:24

  8. [8]

    Pegasus: Data-adaptive differentially private stream process- ing

    CHEN, Y., MACHANAVAJJHALA, A., HAY, M.,ANDMIKLAU, G. Pegasus: Data-adaptive differentially private stream process- ing. InProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017(2017), pp. 1375–1388

  9. [9]

    Differential privacy in the shuffle model: A survey of separations.CoRR abs/2107.11839(2021)

    CHEU, A. Differential privacy in the shuffle model: A survey of separations.CoRR abs/2107.11839(2021)

  10. [10]

    D., ULLMAN, J

    CHEU, A., SMITH, A. D., ULLMAN, J. R., ZEBER, D.,AND ZHILYAEV, M. Distributed differential privacy via shuffling. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual In- ternational Conference on the Theory and Applications of Crypto- graphic Techniques, Darmstadt, Germany, May 19-23, 2019, Pro- ceedings, Part I(2019), Y . Ishai and V . Rijmen, Eds.,...

  11. [11]

    Mean estimation with user-level privacy under data het- erogeneity

    CUMMINGS, R., FELDMAN, V., MCMILLAN, A.,ANDTAL- WAR, K. Mean estimation with user-level privacy under data het- erogeneity. InAdvances in Neural Information Processing Sys- tems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022(2022)

  12. [12]

    Continual observation under user-level differential privacy

    DONG, W., LUO, Q.,ANDYI, K. Continual observation under user-level differential privacy. In44th IEEE Symposium on Secu- rity and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023(2023), pp. 2190–2207

  13. [13]

    T., LIN, X.,ANDXI, W

    DU, L., CHENG, P., CHEN, L., SHEN, H. T., LIN, X.,ANDXI, W. Infinite stream estimation under personalizedw-event privacy. Proc. VLDB Endow. 18, 6 (2025), 1111–1123

  14. [14]

    Dynamic private task assignment under differen- tial privacy

    DU, L., CHENG, P., ZHENG, L., XI, W., LIN, X., ZHANG, W., ANDFANG, J. Dynamic private task assignment under differen- tial privacy. In39th IEEE International Conference on Data Engi- neering, ICDE 2023, Anaheim, CA, USA, April 3-7, 2023(2023), pp. 2740–2752

  15. [15]

    D., MCMAHAN, H

    DVIJOTHAM, K. D., MCMAHAN, H. B., PILLUTLA, K., STEINKE, T.,ANDTHAKURTA, A. Efficient and near-optimal noise generation for streaming differential privacy. In65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024(2024), pp. 2306– 2317

  16. [16]

    Differential privacy

    DWORK, C. Differential privacy. InAutomata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II(2006), M. Bugliesi, B. Preneel, V . Sassone, and I. Wegener, Eds., vol. 4052 ofLecture Notes in Computer Science, Springer, pp. 1– 12

  17. [17]

    Differential privacy in new settings

    DWORK, C. Differential privacy in new settings. InProceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010 (2010), pp. 174–183

  18. [18]

    DWORK, C., NAOR, M., PITASSI, T.,ANDROTHBLUM, G. N. Differential privacy under continual observation. InProceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010(2010), pp. 715–724

  19. [19]

    The algorithmic foundations of dif- ferential privacy.Found

    DWORK, C.,ANDROTH, A. The algorithmic foundations of dif- ferential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211–407

  20. [20]

    RAPPOR: randomized aggregatable privacy-preserving ordinal response

    ERLINGSSON, ´U., PIHUR, V.,ANDKOROLOVA, A. RAPPOR: randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014(2014), G. Ahn, M. Yung, and N. Li, Eds., ACM, pp. 1054–1067

  21. [21]

    An adaptive approach to real-time ag- gregate monitoring with differential privacy.IEEE Trans

    FAN, L.,ANDXIONG, L. An adaptive approach to real-time ag- gregate monitoring with differential privacy.IEEE Trans. Knowl. Data Eng. 26, 9 (2014), 2094–2106

  22. [22]

    DPI: ensuring strict differential privacy for infinite data streaming

    FENG, S., MOHAMMADY, M., WANG, H., LI, X., QIN, Z.,AND HONG, Y. DPI: ensuring strict differential privacy for infinite data streaming. InIEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024(2024), pp. 1009– 1027

  23. [23]

    Sleep scheduling for critical event monitoring in wireless sensor net- works.IEEE Trans

    GUO, P., JIANG, T., ZHANG, Q.,ANDZHANG, K. Sleep scheduling for critical event monitoring in wireless sensor net- works.IEEE Trans. Parallel Distributed Syst. 23, 2 (2012), 345– 352

  24. [24]

    Conservative or liberal? personalized differential privacy

    JORGENSEN, Z., YU, T.,ANDCORMODE, G. Conservative or liberal? personalized differential privacy. In31st IEEE Interna- tional Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015(2015), pp. 1023–1034

  25. [25]

    Differentially private event sequences over infinite streams

    KELLARIS, G., PAPADOPOULOS, S., XIAO, X.,ANDPAPADIAS, D. Differentially private event sequences over infinite streams. Proc. VLDB Endow. 7, 12 (2014), 1155–1166

  26. [26]

    One-sided differential pri- vacy

    KOTSOGIANNIS, I., DOUDALIS, S., HANEY, S., MACHANAVA- JJHALA, A.,ANDMEHROTRA, S. One-sided differential pri- vacy. In36th IEEE International Conference on Data Engineer- ing, ICDE 2020, Dallas, TX, USA, April 20-24, 2020(2020), pp. 493–504

  27. [27]

    KULLBACK, S.,ANDLEIBLER, R. A. On information and suffi- ciency.The annals of mathematical statistics 22, 1 (1951), 79–86

  28. [28]

    Locally private stream- ing data release with shuffling and subsampling

    LI, X., CAO, Y.,ANDYOSHIKAWA, M. Locally private stream- ing data release with shuffling and subsampling. In39th IEEE In- ternational Conference on Data Engineering, ICDE 2023 - Work- shops, Anaheim, CA, USA, April 3-7, 2023(2023), IEEE, pp. 125– 131

  29. [29]

    SPAS: continuous release of data streams under w- event differential privacy.Proc

    LI, X., LI, T., CHENG, Y., GONG, C., REN, K., QIN, Z.,AND WANG, T. SPAS: continuous release of data streams under w- event differential privacy.Proc. ACM Manag. Data 3, 1 (2025), 78a:1–78a:27

  30. [30]

    Divergence measures based on the shannon entropy.IEEE Trans

    LIN, J. Divergence measures based on the shannon entropy.IEEE Trans. Inf. Theory 37, 1 (1991), 145–151

  31. [31]

    Projected federated averaging with heterogeneous differential privacy.Proc

    LIU, J., LOU, J., XIONG, L., LIU, J.,ANDMENG, X. Projected federated averaging with heterogeneous differential privacy.Proc. VLDB Endow. 15, 4 (2021), 828–840

  32. [32]

    Query - dependent video representation for moment retrieval and high- light detection

    MOON, W., HYUN, S., PARK, S., PARK, D.,ANDHEO, J. Query - dependent video representation for moment retrieval and high- light detection. InIEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023(2023), pp. 23023–23033

  33. [33]

    Utility-optimized local differential privacy mechanisms for distribution estimation

    MURAKAMI, T.,ANDKAWAMOTO, Y. Utility-optimized local differential privacy mechanisms for distribution estimation. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019(2019), pp. 1877–1894

  34. [34]

    LDP-IDS: local differential privacy for infinite data streams

    REN, X., SHI, L., YU, W., YANG, S., ZHAO, C.,ANDXU, Z. LDP-IDS: local differential privacy for infinite data streams. In SIGMOD ’22: International Conference on Management of Data, Philadelphia, PA, USA, June 12 - 17, 2022(2022), pp. 1064–1077

  35. [35]

    Personalized trun- cation for personalized privacy.Proc

    SUN, D., DONG, W., QIU, Y.,ANDYI, K. Personalized trun- cation for personalized privacy.Proc. ACM Manag. Data 2, 6 (2024), 249:1–249:25. SIGMOD 2025

  36. [36]

    Concurrent shuffle differential privacy under continual obser- vation

    TENENBAUM, J., KAPLAN, H., MANSOUR, Y.,ANDSTEMMER, U. Concurrent shuffle differential privacy under continual obser- vation. InInternational Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA(2023), A. Krause, E. Brunskill, K. Cho, B. Engelhardt, S. Sabato, and J. Scarlett, Eds., vol. 202 ofProceedings of Machine Learning Re...

  37. [37]

    Rescuedp: Real-time spatio-temporal crowd-sourced data pub- lishing with differential privacy

    WANG, Q., ZHANG, Y., LU, X., WANG, Z., QIN, Z.,ANDREN, K. Rescuedp: Real-time spatio-temporal crowd-sourced data pub- lishing with differential privacy. In35th Annual IEEE Inter- national Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016(2016), pp. 1– 9

  38. [38]

    Differential private data stream analytics in the lo- cal and shuffle models.IEEE Trans

    WANG, S., LI, J., PENG, Y., CHEN, K., YANG, W., JIANG, H., ANDLI, J. Differential private data stream analytics in the lo- cal and shuffle models.IEEE Trans. Mob. Comput. 24, 7 (2025), 6701–6717

  39. [39]

    Q., ZHANG, Z., SU, D., CHENG, Y., LI, Z., LI, N.,ANDJHA, S

    WANG, T., CHEN, J. Q., ZHANG, Z., SU, D., CHENG, Y., LI, Z., LI, N.,ANDJHA, S. Continuous release of data streams under both centralized and local differential privacy. InCCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Se- curity, Virtual Event, Republic of Korea, November 15 - 19, 2021 (2021), pp. 1237–1253. Personalizedw-Event Privacy...

  40. [40]

    Personalized privacy-preserving task allocation for mobile crowdsensing.IEEE Trans

    WANG, Z., HU, J., LV, R., WEI, J., WANG, Q., YANG, D.,AND QI, H. Personalized privacy-preserving task allocation for mobile crowdsensing.IEEE Trans. Mob. Comput. 18, 6 (2019), 1330– 1341

  41. [41]

    Towards pattern-aware privacy-preserving real-time data col- lection

    WANG, Z., LIU, W., PANG, X., REN, J., LIU, Z.,ANDCHEN, Y. Towards pattern-aware privacy-preserving real-time data col- lection. In39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, July 6-9, 2020(2020), pp. 109–118

  42. [42]

    A prompt log analysis of text-to-image generation systems

    XIE, Y., PAN, Z., MA, J., JIE, L.,ANDMEI, Q. A prompt log analysis of text-to-image generation systems. InProceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023(2023), pp. 3892–3902

  43. [43]

    DDRM: A continual frequency estimation mechanism with local differential privacy.IEEE Trans

    XUE, Q., YE, Q., HU, H., ZHU, Y.,ANDWANG, J. DDRM: A continual frequency estimation mechanism with local differential privacy.IEEE Trans. Knowl. Data Eng. 35, 7 (2023), 6784–6797

  44. [44]

    Nationtelescope: Monitoring and visualizing large-scale collective behavior in lb- sns.J

    YANG, D., ZHANG, D., CHEN, L.,ANDQU, B. Nationtelescope: Monitoring and visualizing large-scale collective behavior in lb- sns.J. Netw. Comput. Appl. 55(2015), 170–180

  45. [45]

    Participatory cultural map- ping based on collective behavior data in location-based social net- works.ACM Trans

    YANG, D., ZHANG, D.,ANDQU, B. Participatory cultural map- ping based on collective behavior data in location-based social net- works.ACM Trans. Intell. Syst. Technol. 7, 3 (2016), 30:1–30:23

  46. [46]

    H.,ANDXUE, Q

    YE, Q., HU, H., HUANG, K., AU, M. H.,ANDXUE, Q. State- ful switch: Optimized time series release with local differential privacy. InIEEE INFOCOM 2023 - IEEE Conference on Com- puter Communications, New York City, NY, USA, May 17-20, 2023 (2023), pp. 1–10

  47. [47]

    Driving with knowledge from the physical world

    YUAN, J., ZHENG, Y., XIE, X.,ANDSUN, G. Driving with knowledge from the physical world. InProceedings of the 17th ACM SIGKDD International Conference on Knowledge Discov- ery and Data Mining, San Diego, CA, USA, August 21-24, 2011 (2011), pp. 316–324

  48. [48]

    T-drive: driving directions based on taxi trajec- tories

    YUAN, J., ZHENG, Y., ZHANG, C., XIE, W., XIE, X., SUN, G., ANDHUANG, Y. T-drive: driving directions based on taxi trajec- tories. In18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2010, November 3-5, 2010, San Jose, CA, USA, Proceedings(2010), pp. 99–108. 8 Appendix 8.1 Running time Analysis In this subse...