<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">JDS</journal-id>
<journal-title-group><journal-title>Journal of Data Science</journal-title></journal-title-group>
<issn pub-type="epub">1683-8602</issn><issn pub-type="ppub">1680-743X</issn><issn-l>1680-743X</issn-l>
<publisher>
<publisher-name>School of Statistics, Renmin University of China</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">JDS1050</article-id>
<article-id pub-id-type="doi">10.6339/22-JDS1050</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Data Science in Action</subject></subj-group></article-categories>
<title-group>
<article-title>Privacy-Preserving Inference on the Ratio of Two Gaussians Using Sums</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Miao</surname><given-names>Jingang</given-names></name><email xlink:href="mailto:jingangmiao@gmail.com">jingangmiao@gmail.com</email><xref ref-type="aff" rid="j_jds1050_aff_001">1</xref><xref ref-type="corresp" rid="cor1">∗</xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Li</surname><given-names>Yiming Paul</given-names></name><xref ref-type="aff" rid="j_jds1050_aff_001">1</xref>
</contrib>
<aff id="j_jds1050_aff_001"><label>1</label><institution>Meta Platforms, Inc.</institution>, <country>United States</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author. Email: <ext-link ext-link-type="uri" xlink:href="mailto:jingangmiao@gmail.com">jingangmiao@gmail.com</ext-link>.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2023</year></pub-date><pub-date pub-type="epub"><day>16</day><month>6</month><year>2022</year></pub-date><volume>21</volume><issue>1</issue><fpage>27</fpage><lpage>42</lpage><supplementary-material id="S1" content-type="document" xlink:href="jds1050_s001.pdf" mimetype="application" mime-subtype="pdf">
<caption>
<title>Supplementary Material</title>
<p>Our simulation code is hosted on GitHub in a Jupyter Notebook file. Replication instructions can be found in the Supplementary Material.</p>
</caption>
</supplementary-material><history><date date-type="received"><day>14</day><month>4</month><year>2022</year></date><date date-type="accepted"><day>21</day><month>5</month><year>2022</year></date></history>
<permissions><copyright-statement>2023 The Author(s). Published by the School of Statistics and the Center for Applied Statistics, Renmin University of China.</copyright-statement><copyright-year>2023</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>The ratio of two Gaussians is useful in many contexts of statistical inference. We discuss statistically valid inference of the ratio under Differential Privacy (DP). We use the delta method to derive the asymptotic distribution of the ratio estimator and use the Gaussian mechanism to provide (epsilon, delta)-DP guarantees. Like many statistics, quantities involved in the inference of a ratio can be re-written as functions of sums, and sums are easy to work with for many reasons. In the context of DP, the sensitivity of a sum is easy to calculate. We focus on getting the correct coverage probability of 95% confidence intervals (CIs) of the DP ratio estimator. Our simulations show that the no-correction method, which ignores the DP noise, gives CIs that are too narrow to provide proper coverage for small samples. In our specific simulation scenario, the coverage of 95% CIs can be as low as below 10%. We propose two methods to mitigate the under-coverage issue, one based on Monte Carlo simulation and the other based on analytical correction. We show that the CIs of our methods have much better coverage with reasonable privacy budgets. In addition, our methods can handle weighted data, when the weights are fixed and bounded.</p>
</abstract>
<kwd-group>
<label>Keywords</label>
<kwd>calibration ratio</kwd>
<kwd>Gaussian mechanism</kwd>
<kwd>Laplace mechanism</kwd>
</kwd-group>
</article-meta>
</front>
<back>
<ref-list id="j_jds1050_reflist_001">
<title>References</title>
<ref id="j_jds1050_ref_001">
<mixed-citation publication-type="other"> <string-name><surname>Abowd</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kifer</surname> <given-names>D</given-names></string-name>, <string-name><surname>Moran</surname> <given-names>B</given-names></string-name>, <string-name><surname>Ashmead</surname> <given-names>R</given-names></string-name>, <string-name><surname>Sexton</surname> <given-names>W</given-names></string-name> (2019). Census topdown: Differentially private data, incremental schemas, and consistency with public knowledge. <uri>https://systems.cs.columbia.edu/private-systems-class/papers/Abowd2019Census.pdf</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_002">
<mixed-citation publication-type="book"> <string-name><surname>Alao</surname> <given-names>R</given-names></string-name>, <string-name><surname>Bogen</surname> <given-names>M</given-names></string-name>, <string-name><surname>Miao</surname> <given-names>J</given-names></string-name>, <string-name><surname>Mironov</surname> <given-names>I</given-names></string-name>, <string-name><surname>Tannen</surname> <given-names>J</given-names></string-name> (<year>2021</year>). <source><italic>How Meta is Working to Assess Fairness in Relation to Race in the U.S. Across Its Products and Systems</italic></source>. <ext-link ext-link-type="uri" xlink:href="https://ai.facebook.com/research/publications/how-meta-is-working-to-assess-fairness-in-relation-to-race-in-the-us-across-its-products-and-systems">https://ai.facebook.com/research/publications/how-meta-is-working-to-assess-fairness-in-relation-to-race-in-the-us-across-its-products-and-systems</ext-link>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_003">
<mixed-citation publication-type="journal"> <string-name><surname>Awan</surname> <given-names>JA</given-names></string-name>, <string-name><surname>Slavkovic</surname> <given-names>A</given-names></string-name> (<year>2020</year>). <article-title>Differentially private inference for binomial data</article-title>. <source><italic>J. Priv. Confid.</italic></source>, <volume>10</volume>(<issue>1</issue>).</mixed-citation>
</ref>
<ref id="j_jds1050_ref_004">
<mixed-citation publication-type="journal"> <string-name><surname>Balle</surname> <given-names>B</given-names></string-name>, <string-name><surname>Barthe</surname> <given-names>G</given-names></string-name>, <string-name><surname>Gaboardi</surname> <given-names>M</given-names></string-name> (<year>2020</year>). <article-title>Privacy profiles and amplification by subsampling</article-title>. <source><italic>J. Priv. Confid.</italic></source>, <volume>10</volume>(<issue>1</issue>).</mixed-citation>
</ref>
<ref id="j_jds1050_ref_005">
<mixed-citation publication-type="chapter"> <string-name><surname>Balle</surname> <given-names>B</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>YX</given-names></string-name> (<year>2018</year>). <chapter-title>Improving the Gaussian mechanism for differential privacy: analytical calibration and optimal denoising</chapter-title>. In: <source><italic>Proceedings of the 35th International Conference on Machine Learning</italic></source>, <fpage>394</fpage>–<lpage>403</lpage>. <comment>PMLR</comment>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_006">
<mixed-citation publication-type="other"> <string-name><surname>Brawner</surname> <given-names>T</given-names></string-name>, <string-name><surname>Honaker</surname> <given-names>J</given-names></string-name> (2018). Bootstrap inference and differential privacy: Standard errors for free. <uri>https://hona.kr/papers/HonakerPrivacyBootstrap.pdf</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_007">
<mixed-citation publication-type="book"> <string-name><surname>Bun</surname> <given-names>M</given-names></string-name>, <string-name><surname>Steinke</surname> <given-names>T</given-names></string-name> (<year>2016</year>). <source><italic>Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds.</italic></source> <series>Lecture Notes in Computer Science</series>, <comment>9985 LNCS</comment> <fpage>635</fpage>–<lpage>658</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_008">
<mixed-citation publication-type="book"> <string-name><surname>Casella</surname> <given-names>G</given-names></string-name>, <string-name><surname>Berger</surname> <given-names>RL</given-names></string-name> (<year>2002</year>). <source><italic>Statistical Inference. Brooks/Cole Cengage Learning</italic></source>, <edition>2</edition>nd ed. edition.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_009">
<mixed-citation publication-type="other"> <string-name><surname>Covington</surname> <given-names>C</given-names></string-name>, <string-name><surname>He</surname> <given-names>X</given-names></string-name>, <string-name><surname>Honaker</surname> <given-names>J</given-names></string-name>, <string-name><surname>Kamath</surname> <given-names>G</given-names></string-name> (2021). Unbiased statistical estimation and valid confidence intervals under differential privacy. arXiv preprint: <uri>https://arxiv.org/abs/2110.14465</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_010">
<mixed-citation publication-type="journal"> <string-name><surname>DeGroot</surname> <given-names>MH</given-names></string-name>, <string-name><surname>Fienberg</surname> <given-names>SE</given-names></string-name> (<year>1983</year>). <article-title>The comparison and evaluation of forecasters</article-title>. <source><italic>J. R. Stat. Soc., Ser. D, Stat.</italic></source>, <volume>32</volume>(<issue>1/2</issue>): <fpage>12</fpage>–<lpage>22</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_011">
<mixed-citation publication-type="chapter"> <string-name><surname>Deng</surname> <given-names>A</given-names></string-name>, <string-name><surname>Knoblich</surname> <given-names>U</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>J</given-names></string-name> (<year>2018</year>). <chapter-title>Applying the delta method in metric analytics: A practical guide with novel ideas</chapter-title>. In: <source><italic>Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining</italic></source>, <fpage>233</fpage>–<lpage>242</lpage>. <publisher-name>ACM, London</publisher-name>, <publisher-loc>United Kingdom</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_012">
<mixed-citation publication-type="journal"> <string-name><surname>Deville</surname> <given-names>JC</given-names></string-name>, <string-name><surname>Sarndal</surname> <given-names>CE</given-names></string-name> (<year>1992</year>). <article-title>Calibration estimators in survey sampling</article-title>. <source><italic>J. Am. Stat. Assoc.</italic></source>, <volume>87</volume>(<issue>418</issue>): <fpage>376</fpage>–<lpage>382</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_013">
<mixed-citation publication-type="other"> <string-name><surname>Dong</surname> <given-names>J</given-names></string-name>, <string-name><surname>Roth</surname> <given-names>A</given-names></string-name>, <string-name><surname>Su</surname> <given-names>W</given-names></string-name> (2019). Gaussian differential privacy. arXiv preprint: <uri>https://arxiv.org/abs/1905.02383</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_014">
<mixed-citation publication-type="other"> <string-name><surname>D’Orazio</surname> <given-names>V</given-names></string-name>, <string-name><surname>Honaker</surname> <given-names>J</given-names></string-name>, <string-name><surname>King</surname> <given-names>G</given-names></string-name> (2015). Differential privacy for social science inference. <uri>https://papers.ssrn.com/abstract=2676160</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_015">
<mixed-citation publication-type="other"> <string-name><surname>Du</surname> <given-names>W</given-names></string-name>, <string-name><surname>Foot</surname> <given-names>C</given-names></string-name>, <string-name><surname>Moniot</surname> <given-names>M</given-names></string-name>, <string-name><surname>Bray</surname> <given-names>A</given-names></string-name>, <string-name><surname>Groce</surname> <given-names>A</given-names></string-name> (2020). Differentially private confidence intervals. arXiv preprint: <uri>http://arxiv.org/abs/2001.02285</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_016">
<mixed-citation publication-type="journal"> <string-name><surname>Dunlap</surname> <given-names>WP</given-names></string-name>, <string-name><surname>Silver</surname> <given-names>NC</given-names></string-name> (<year>1986</year>). <article-title>Confidence intervals and standard errors for ratios of normal variables</article-title>. <source><italic>Behav. Res. Methods Instrum. Comput.</italic></source>, <volume>18</volume>(<issue>5</issue>): <fpage>469</fpage>–<lpage>471</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_017">
<mixed-citation publication-type="chapter"> <string-name><surname>Dwork</surname> <given-names>C</given-names></string-name>, <string-name><surname>Kenthapadi</surname> <given-names>K</given-names></string-name>, <string-name><surname>Mcsherry</surname> <given-names>F</given-names></string-name>, <string-name><surname>Mironov</surname> <given-names>I</given-names></string-name>, <string-name><surname>Naor</surname> <given-names>M</given-names></string-name> (<year>2006</year>a). <chapter-title>Our data, ourselves: Privacy via distributed noise generation</chapter-title>. In: <source><italic>Annual International Conference on the Theory and Applications of Cryptographic Techniques</italic></source>, <fpage>486</fpage>–<lpage>503</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_018">
<mixed-citation publication-type="chapter"> <string-name><surname>Dwork</surname> <given-names>C</given-names></string-name>, <string-name><surname>Lei</surname> <given-names>J</given-names></string-name> (<year>2009</year>). <chapter-title>Differential privacy and robust statistics</chapter-title>. In: <source><italic>Proceedings of the Annual ACM Symposium on Theory of Computing</italic></source>, <fpage>371</fpage>–<lpage>380</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_019">
<mixed-citation publication-type="chapter"> <string-name><surname>Dwork</surname> <given-names>C</given-names></string-name>, <string-name><surname>McSherry</surname> <given-names>F</given-names></string-name>, <string-name><surname>Nissim</surname> <given-names>K</given-names></string-name>, <string-name><surname>Smith</surname> <given-names>A</given-names></string-name> (<year>2006</year>b). <chapter-title>Calibrating noise to sensitivity in private data analysis</chapter-title>. In: <source><italic>Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</italic></source>, volume <volume>3876 LNCS</volume>, <fpage>265</fpage>–<lpage>284</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_020">
<mixed-citation publication-type="journal"> <string-name><surname>Dwork</surname> <given-names>C</given-names></string-name>, <string-name><surname>Roth</surname> <given-names>A</given-names></string-name> (<year>2014</year>). <article-title>The algorithmic foundations of differential privacy</article-title>. <source><italic>Foundations and Trends</italic>® <italic>in Theoretical Computer Science</italic></source>, <volume>9</volume>(<issue>3–4</issue>): <fpage>211</fpage>–<lpage>407</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_021">
<mixed-citation publication-type="journal"> <string-name><surname>Dwork</surname> <given-names>C</given-names></string-name>, <string-name><surname>Smith</surname> <given-names>A</given-names></string-name>, <string-name><surname>Steinke</surname> <given-names>T</given-names></string-name>, <string-name><surname>Ullman</surname> <given-names>J</given-names></string-name> (<year>2017</year>). <article-title>Exposed! A survey of attacks on private data</article-title>. <source><italic>Annual Review of Statistics and Its Application (2017)</italic></source>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_022">
<mixed-citation publication-type="chapter"> <string-name><surname>Erlingsson</surname> <given-names>Ú</given-names></string-name>, <string-name><surname>Pihur</surname> <given-names>V</given-names></string-name>, <string-name><surname>Korolova</surname> <given-names>A</given-names></string-name> (<year>2014</year>). <chapter-title>RAPPOR: Randomized aggregatable privacy-preserving ordinal response</chapter-title>. In: <source><italic>Proceedings of the ACM Conference on Computer and Communications Security</italic></source>, <fpage>1054</fpage>–<lpage>1067</lpage>. <publisher-name>Association for Computing Machinery</publisher-name>, <publisher-loc>New York, New York, USA</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_023">
<mixed-citation publication-type="other"> <string-name><surname>Evans</surname> <given-names>G</given-names></string-name>, <string-name><surname>Honaker</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>PY</given-names></string-name> (2021). Bayesian experimentation with differential privacy. unpublished manuscript.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_024">
<mixed-citation publication-type="other"> <string-name><surname>Evans</surname> <given-names>G</given-names></string-name>, <string-name><surname>King</surname> <given-names>G</given-names></string-name>, <string-name><surname>Schwenzfeier</surname> <given-names>M</given-names></string-name>, <string-name><surname>Thakurta</surname> <given-names>A</given-names></string-name> (2019). Statistically valid inferences from privacy protected data. <ext-link ext-link-type="uri" xlink:href="https://www.semanticscholar.org/paper/Statistically-Valid-Inferences-from-Privacy-Data-Evans-King/1ac938181a198b1c6b7b46126a93ac3ae3e4cc60">https://www.semanticscholar.org/paper/Statistically-Valid-Inferences-from-Privacy-Data-Evans-King/1ac938181a198b1c6b7b46126a93ac3ae3e4cc60</ext-link>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_025">
<mixed-citation publication-type="other"> <string-name><surname>Ferrando</surname> <given-names>C</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sheldon</surname> <given-names>D</given-names></string-name> (2020). General-purpose differentially-private confidence intervals. arXiv preprint: <uri>http://arxiv.org/abs/2006.07749</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_026">
<mixed-citation publication-type="chapter"> <string-name><surname>Gaboardi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Lim</surname> <given-names>HW</given-names></string-name>, <string-name><surname>Rogers</surname> <given-names>R</given-names></string-name>, <string-name><surname>Vadhan</surname> <given-names>SP</given-names></string-name> (<year>2016</year>). <chapter-title>Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing</chapter-title>. In: <source><italic>33rd International Conference on Machine Learning, ICML 2016</italic></source>, volume <volume>5</volume>, <fpage>3086</fpage>–<lpage>3121</lpage>. <comment>PMLR</comment>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_027">
<mixed-citation publication-type="chapter"> <string-name><surname>Geng</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Ding</surname> <given-names>W</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>R</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>S</given-names></string-name> (<year>2020</year>). <chapter-title>Tight analysis of privacy and utility tradeoff in approximate differential privacy</chapter-title>. In: <source><italic>Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics</italic></source> (<string-name><given-names>S</given-names> <surname>Chiappa</surname></string-name>, <string-name><given-names>R</given-names> <surname>Calandra</surname></string-name>, eds.), volume <volume>108</volume> of <series><italic>Proceedings of Machine Learning Research</italic></series>, <fpage>89</fpage>–<lpage>99</lpage>. <comment>PMLR</comment>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_028">
<mixed-citation publication-type="journal"> <string-name><surname>Gneiting</surname> <given-names>T</given-names></string-name>, <string-name><surname>Raftery</surname> <given-names>AE</given-names></string-name> (<year>2007</year>). <article-title>Strictly proper scoring rules, prediction, and estimation</article-title>. <source><italic>J. Am. Stat. Assoc.</italic></source>, <volume>102</volume>(<issue>477</issue>): <fpage>359</fpage>–<lpage>378</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_029">
<mixed-citation publication-type="journal"> <string-name><surname>Harris</surname> <given-names>CR</given-names></string-name>, <string-name><surname>KJ</surname> <given-names>vdWS</given-names></string-name>, <string-name><surname>Gommers R</surname> <given-names>M</given-names></string-name> (<year>2020</year>). <article-title>Array programming with NumPy</article-title>. <source><italic>Nature</italic></source>, <volume>585</volume>(<issue>7825</issue>): <fpage>357</fpage>–<lpage>362</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_030">
<mixed-citation publication-type="other"> <string-name><surname>Hirschberg</surname> <given-names>J</given-names></string-name>, <string-name><surname>Lye</surname> <given-names>JN</given-names></string-name> (2007). Providing intuition to the Fieller method with two geometric representations using stata and Eviews. <uri>https://minerva-access.unimelb.edu.au/handle/11343/34613</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_031">
<mixed-citation publication-type="journal"> <string-name><surname>Kairouz</surname> <given-names>P</given-names></string-name>, <string-name><surname>Oh</surname> <given-names>S</given-names></string-name>, <string-name><surname>Viswanath</surname> <given-names>P</given-names></string-name> (<year>2017</year>). <article-title>The composition theorem for differential privacy</article-title>. <source><italic>IEEE Trans. Inf. Theory</italic></source>, <volume>63</volume>(<issue>6</issue>): <fpage>4037</fpage>–<lpage>4049</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_032">
<mixed-citation publication-type="other"> <string-name><surname>Karwa</surname> <given-names>V</given-names></string-name>, <string-name><surname>Vadhan</surname> <given-names>S</given-names></string-name> (2017). Finite sample differentially private confidence intervals. arXiv preprint: <uri>https://arxiv.org/abs/1711.03908</uri>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_033">
<mixed-citation publication-type="chapter"> <string-name><surname>Kasiviswanathan</surname> <given-names>SP</given-names></string-name>, <string-name><surname>Lee</surname> <given-names>HK</given-names></string-name>, <string-name><surname>Nissim</surname> <given-names>K</given-names></string-name>, <string-name><surname>Raskhodnikova</surname> <given-names>S</given-names></string-name>, <string-name><surname>Smith</surname> <given-names>A</given-names></string-name> (<year>2008</year>). <chapter-title>What can we learn privately?</chapter-title> In: <source><italic>2008 49th Annual IEEE Symposium on Foundations of Computer Science</italic></source>, <fpage>531</fpage>–<lpage>540</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_034">
<mixed-citation publication-type="book"> <string-name><surname>Kish</surname> <given-names>L</given-names></string-name> (<year>1965</year>). <source><italic>Survey Sampling</italic></source>. <publisher-name>John Wiley &amp; Sons</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_035">
<mixed-citation publication-type="journal"> <string-name><surname>Kleiner</surname> <given-names>A</given-names></string-name>, <string-name><surname>Talwalkar</surname> <given-names>A</given-names></string-name>, <string-name><surname>Sarkar</surname> <given-names>P</given-names></string-name>, <string-name><surname>Jordan</surname> <given-names>MI</given-names></string-name> (<year>2014</year>). <article-title>A scalable bootstrap for massive data</article-title>. <source><italic>J. R. Stat. Soc., Ser. B, Stat. Methodol.</italic></source>, <volume>76</volume>(<issue>4</issue>): <fpage>795</fpage>–<lpage>816</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_036">
<mixed-citation publication-type="chapter"> <string-name><surname>Miller</surname> <given-names>RG</given-names></string-name> (<year>1962</year>). <chapter-title>Statistical prediction by discriminant analysis</chapter-title>. In: <source><italic>Statistical Prediction by Discriminant Analysis</italic></source>, <fpage>1</fpage>–<lpage>54</lpage>. <publisher-name>Springer</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_037">
<mixed-citation publication-type="chapter"> <string-name><surname>Mironov</surname> <given-names>I</given-names></string-name> (<year>2017</year>). <chapter-title>Rényi differential privacy</chapter-title>. In: <source><italic>2017 IEEE 30th Computer Security Foundations Symposium (CSF)</italic></source>, <fpage>263</fpage>–<lpage>275</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_038">
<mixed-citation publication-type="chapter"> <string-name><surname>Movahedi</surname> <given-names>M</given-names></string-name>, <string-name><surname>Case</surname> <given-names>BM</given-names></string-name>, <string-name><surname>Honaker</surname> <given-names>J</given-names></string-name>, <string-name><surname>Knox</surname> <given-names>A</given-names></string-name>, <string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Li</surname> <given-names>YP</given-names></string-name>, <etal>et al.</etal> (<year>2021</year>). <chapter-title>Privacy-preserving randomized controlled trials: A protocol for industry scale deployment</chapter-title>. In: <source><italic>Proceedings of the 2021 on Cloud Computing Security Workshop</italic></source>, <fpage>59</fpage>–<lpage>69</lpage>. <publisher-name>ACM</publisher-name>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_039">
<mixed-citation publication-type="journal"> <string-name><surname>Murphy</surname> <given-names>AH</given-names></string-name> (<year>1972</year>). <article-title>Scalar and vector partitions of the probability score: Part I. Two-state situation</article-title>. <source><italic>Journal of Applied Meteorology</italic></source>, <volume>11</volume>(<issue>2</issue>): <fpage>273</fpage>–<lpage>282</lpage>.</mixed-citation>
</ref>
<ref id="j_jds1050_ref_040">
<mixed-citation publication-type="chapter"> <string-name><surname>Vu</surname> <given-names>D</given-names></string-name>, <string-name><surname>Slavkovic</surname> <given-names>A</given-names></string-name> (<year>2009</year>). <chapter-title>Differential privacy for clinical trial data: Preliminary evaluations</chapter-title>. In: <source><italic>2009 IEEE International Conference on Data Mining Workshops</italic></source>, <fpage>138</fpage>–<lpage>143</lpage>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
