{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:5NBH7EQTDMXLEWOEWMJZGRS6PI","short_pith_number":"pith:5NBH7EQT","canonical_record":{"source":{"id":"1803.02596","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2018-03-07T11:03:36Z","cross_cats_sorted":["cs.LG","stat.ME"],"title_canon_sha256":"d4c39947b3461ab5a942ddd020118dfc0c900e17970be37997d3d6cc30d63847","abstract_canon_sha256":"063f6cb7ada1adcd92a1c1d72202806f81acd30e8ff772dc46aaa5053e681b06"},"schema_version":"1.0"},"canonical_sha256":"eb427f92131b2eb259c4b31393465e7a05c1b4abfef91b095d77f8302d8c272e","source":{"kind":"arxiv","id":"1803.02596","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.02596","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"arxiv_version","alias_value":"1803.02596v2","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.02596","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"pith_short_12","alias_value":"5NBH7EQTDMXL","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_16","alias_value":"5NBH7EQTDMXLEWOE","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_8","alias_value":"5NBH7EQT","created_at":"2026-05-18T12:32:08Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:5NBH7EQTDMXLEWOEWMJZGRS6PI","target":"record","payload":{"canonical_record":{"source":{"id":"1803.02596","kind":"arxiv","version":2},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2018-03-07T11:03:36Z","cross_cats_sorted":["cs.LG","stat.ME"],"title_canon_sha256":"d4c39947b3461ab5a942ddd020118dfc0c900e17970be37997d3d6cc30d63847","abstract_canon_sha256":"063f6cb7ada1adcd92a1c1d72202806f81acd30e8ff772dc46aaa5053e681b06"},"schema_version":"1.0"},"canonical_sha256":"eb427f92131b2eb259c4b31393465e7a05c1b4abfef91b095d77f8302d8c272e","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:11:17.740732Z","signature_b64":"6EIWMr2ylL4HWXbcyfjSRMjmIhzwuruI5gVygQ8Qg5JuDL3nePTCixFxMJjQP7EpsQb1znUh8hGwIiBZfiUgBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"eb427f92131b2eb259c4b31393465e7a05c1b4abfef91b095d77f8302d8c272e","last_reissued_at":"2026-05-18T00:11:17.740095Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:11:17.740095Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1803.02596","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:11:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"0GEfPQqG1Qw6+iy3TWQH3HWELMzu+vtpBt2CB9UJZ7Y2O6kG15KpzhZRkkffFV1iDo+6O9y6F8EvJyd2GF62CQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:34:03.090886Z"},"content_sha256":"76857ee7c9e9958e945f945b9a668545c53434bff014e3dace7da1738e2d467d","schema_version":"1.0","event_id":"sha256:76857ee7c9e9958e945f945b9a668545c53434bff014e3dace7da1738e2d467d"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:5NBH7EQTDMXLEWOEWMJZGRS6PI","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Revisiting differentially private linear regression: optimal and adaptive prediction & estimation in unbounded domain","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["cs.LG","stat.ME"],"primary_cat":"stat.ML","authors_text":"Yu-Xiang Wang","submitted_at":"2018-03-07T11:03:36Z","abstract_excerpt":"We revisit the problem of linear regression under a differential privacy constraint. By consolidating existing pieces in the literature, we clarify the correct dependence of the feature, label and coefficient domains in the optimization error and estimation error, hence revealing the delicate price of differential privacy in statistical estimation and statistical learning. Moreover, we propose simple modifications of two existing DP algorithms: (a) posterior sampling, (b) sufficient statistics perturbation, and show that they can be upgraded into **adaptive** algorithms that are able to exploi"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.02596","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:11:17Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"FLPOKpfbW567hbdR3T/7c9mryv0Wmj6ossuM8SCvEcV9gIVXRCGSAB0NXrxNk0bBrnQAux1kLU1QHj/nqlHWBw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-21T18:34:03.091241Z"},"content_sha256":"8bb319dd5cdce7c68de60428770ecd3d076b9f62ba6d67c61eb56a5cd0b494d8","schema_version":"1.0","event_id":"sha256:8bb319dd5cdce7c68de60428770ecd3d076b9f62ba6d67c61eb56a5cd0b494d8"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/bundle.json","state_url":"https://pith.science/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-21T18:34:03Z","links":{"resolver":"https://pith.science/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI","bundle":"https://pith.science/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/bundle.json","state":"https://pith.science/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/state.json","well_known_bundle":"https://pith.science/.well-known/pith/5NBH7EQTDMXLEWOEWMJZGRS6PI/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:5NBH7EQTDMXLEWOEWMJZGRS6PI","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"063f6cb7ada1adcd92a1c1d72202806f81acd30e8ff772dc46aaa5053e681b06","cross_cats_sorted":["cs.LG","stat.ME"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2018-03-07T11:03:36Z","title_canon_sha256":"d4c39947b3461ab5a942ddd020118dfc0c900e17970be37997d3d6cc30d63847"},"schema_version":"1.0","source":{"id":"1803.02596","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1803.02596","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"arxiv_version","alias_value":"1803.02596v2","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1803.02596","created_at":"2026-05-18T00:11:17Z"},{"alias_kind":"pith_short_12","alias_value":"5NBH7EQTDMXL","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_16","alias_value":"5NBH7EQTDMXLEWOE","created_at":"2026-05-18T12:32:08Z"},{"alias_kind":"pith_short_8","alias_value":"5NBH7EQT","created_at":"2026-05-18T12:32:08Z"}],"graph_snapshots":[{"event_id":"sha256:8bb319dd5cdce7c68de60428770ecd3d076b9f62ba6d67c61eb56a5cd0b494d8","target":"graph","created_at":"2026-05-18T00:11:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"We revisit the problem of linear regression under a differential privacy constraint. By consolidating existing pieces in the literature, we clarify the correct dependence of the feature, label and coefficient domains in the optimization error and estimation error, hence revealing the delicate price of differential privacy in statistical estimation and statistical learning. Moreover, we propose simple modifications of two existing DP algorithms: (a) posterior sampling, (b) sufficient statistics perturbation, and show that they can be upgraded into **adaptive** algorithms that are able to exploi","authors_text":"Yu-Xiang Wang","cross_cats":["cs.LG","stat.ME"],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2018-03-07T11:03:36Z","title":"Revisiting differentially private linear regression: optimal and adaptive prediction & estimation in unbounded domain"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1803.02596","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:76857ee7c9e9958e945f945b9a668545c53434bff014e3dace7da1738e2d467d","target":"record","created_at":"2026-05-18T00:11:17Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"063f6cb7ada1adcd92a1c1d72202806f81acd30e8ff772dc46aaa5053e681b06","cross_cats_sorted":["cs.LG","stat.ME"],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"stat.ML","submitted_at":"2018-03-07T11:03:36Z","title_canon_sha256":"d4c39947b3461ab5a942ddd020118dfc0c900e17970be37997d3d6cc30d63847"},"schema_version":"1.0","source":{"id":"1803.02596","kind":"arxiv","version":2}},"canonical_sha256":"eb427f92131b2eb259c4b31393465e7a05c1b4abfef91b095d77f8302d8c272e","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"eb427f92131b2eb259c4b31393465e7a05c1b4abfef91b095d77f8302d8c272e","first_computed_at":"2026-05-18T00:11:17.740095Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:11:17.740095Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"6EIWMr2ylL4HWXbcyfjSRMjmIhzwuruI5gVygQ8Qg5JuDL3nePTCixFxMJjQP7EpsQb1znUh8hGwIiBZfiUgBA==","signature_status":"signed_v1","signed_at":"2026-05-18T00:11:17.740732Z","signed_message":"canonical_sha256_bytes"},"source_id":"1803.02596","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:76857ee7c9e9958e945f945b9a668545c53434bff014e3dace7da1738e2d467d","sha256:8bb319dd5cdce7c68de60428770ecd3d076b9f62ba6d67c61eb56a5cd0b494d8"],"state_sha256":"964990d8b95d721afe8f60b680a16a6aa42e319d01304ce323ebaf2bebf942b9"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"2NznuOXDlWzd947BgDL5qpeuMVo0ofVixadZG/dT1inV4e7SKoEqQ/JJOFuVnVw8s+2bm0vh0pJ71aj3BtCYDg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-21T18:34:03.094776Z","bundle_sha256":"33863cd48caf936218e040d0488a70b9d55e47202e5de049d98c9a615d2abf1e"}}