Submission

Submission server opens: April 1st
Submission server closes: May 1st AOE | capacity filled


Differential privacy has become the pre-eminent framework to measure and limit loss in privacy when statistics about sensitive data are computed and released. The theoretical study of differential privacy has extended far beyond this scope, establishing deep relationships with long studied areas of theoretical computer science, such as learning theory, robust algorithm design, adaptive data analysis and hypothesis testing. The goal of this workshop is to share and disseminate recent developments in the theory of differential privacy. We invite submissions of works dealing with the following topics:

  • New differentially private mechanisms for wide variety of algorithmic problems superior to prior work
  • Novel privacy accounting techniques and analyses
  • Lower bounds/impossibility results related to differential privacy
  • Relationships between differential privacy and other areas of TCS (for example formal methods)

Other closely allied topics may also be considered. Note that new mechanisms whose performance evaluation is purely empirical, without theoretical guarantees, are not within the scope of the workshop.

This workshop is non-archival and submission does not preclude submission at any future venues; works published prior are also welcome and encouraged. The reviews will be high-level, judging works based solely on novelty, interest, and relevance. Accepted submissions will be invited to present a poster in one of two poster sessions to be held at the workshop.


Submission Format

The submitted file should be a pdf, with at least 1 inch margins and a 10 point font, not including references. The file size should be at most 10 MB. Reviewers are only required to read the first 4 pages to assess the work, and may brief the rest of the material to judge the work at their discretion.The submission server will close at May 1st AOE, or until we reach capacity and author notifications will be made by June 1st. Please disclose whether an LLM was used for any part of the submission, and if so, in what manner.


Review Process

Each submission will be reviewed by members of the program committee and potential sub-reviewers. There is no expectation of extensive checks for correctness, just high-level sanity checks and most importantly an evaluation of interest and relevance to the workshop topics listed above. The submissions are not anonymous.