-
3
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
ACM New York, NY, USA
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 273-282. ACM New York, NY, USA, 2007.
-
(2007)
Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
4
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
ACM New York, NY, USA
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 128-138. ACM New York, NY, USA, 2005.
-
(2005)
Proceedings of the Twenty-fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
5
-
-
0028062299
-
Weakly learning DNF and characterizing statistical query learning using Fourier analysis
-
ACM
-
A. Blum, M. Furst, J. Jackson, M. Kearns, Y. Mansour, and S. Rudich. Weakly learning DNF and characterizing statistical query learning using Fourier analysis. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, page 262. ACM, 1994.
-
(1994)
Proceedings of the Twenty-sixth Annual ACM Symposium on Theory of Computing
, pp. 262
-
-
Blum, A.1
Furst, M.2
Jackson, J.3
Kearns, M.4
Mansour, Y.5
Rudich, S.6
-
7
-
-
0034344120
-
A sharp concentration inequality with applications
-
S. Boucheron, G. Lugosi, and P. Massart. A sharp concentration inequality with applications. Random Structures and Algorithms, 16(3):277-292, 2000.
-
(2000)
Random Structures and Algorithms
, vol.16
, Issue.3
, pp. 277-292
-
-
Boucheron, S.1
Lugosi, G.2
Massart, P.3
-
9
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Proceedings of the Third Theory of Cryptography Conference TCC, Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Third Theory of Cryptography Conference TCC, volume 3876 of Lecture Notes in Computer Science, page 265. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 265
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
ACM New York, NY, USA
-
C. Dwork, M. Naor, O. Reingold, G. Rothblum, and S. Vadhan. On the complexity of differentially private data release: efficient algorithms and hardness results. In Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, pages 381-390. ACM New York, NY, USA, 2009.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.4
Vadhan, S.5
-
14
-
-
70349108343
-
Approximating submodular functions everywhere
-
M. X. Goemans, N. J. A. Harvey, S. Iwata, and V. S. Mirrokni. Approximating submodular functions everywhere. In SODA, pages 535-544, 2009.
-
(2009)
SODA
, pp. 535-544
-
-
Goemans, M.X.1
Harvey, N.J.A.2
Iwata, S.3
Mirrokni, V.S.4
-
18
-
-
57949111704
-
What Can We Learn Privately?
-
S. Kasiviswanathan, H. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What Can We Learn Privately? In IEEE 49th Annual IEEE Symposium on Foundations of Computer Science, 2008. FOCS'08, pages 531-540, 2008.
-
(2008)
IEEE 49th Annual IEEE Symposium on Foundations of Computer Science, 2008. FOCS'08
, pp. 531-540
-
-
Kasiviswanathan, S.1
Lee, H.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
19
-
-
77954693385
-
The Price of Privately Releasing Contingency Tables and the Spectra of Random Matrices with Correlated Rows
-
S. Kasiviswanathan, M. Rudelson, A. Smith, and J. Ullman. The Price of Privately Releasing Contingency Tables and the Spectra of Random Matrices with Correlated Rows. In The 42nd ACM Symposium on the Theory of Computing, 2010. STOC'10, 2010.
-
The 42nd ACM Symposium on the Theory of Computing, 2010. STOC'10, 2010
-
-
Kasiviswanathan, S.1
Rudelson, M.2
Smith, A.3
Ullman, J.4
-
20
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
M. Kearns. Efficient noise-tolerant learning from statistical queries. Journal of the ACM (JACM), 45(6):983-1006, 1998.
-
(1998)
Journal of the ACM (JACM)
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
21
-
-
36349024290
-
Near-optimal observation selection using submodular functions
-
Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press
-
A. Krause and C. Guestrin. Near-optimal observation selection using submodular functions. In Proceedings of the National Conference on Artificial Intelligence, volume 22, page 1650. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2007.
-
(1999)
Proceedings of the National Conference on Artificial Intelligence
, vol.22
, pp. 1650
-
-
Krause, A.1
Guestrin, C.2
-
22
-
-
35148838877
-
The weighted majority algorithm
-
N. Littlestone and M. K. Warmuth. The weighted majority algorithm. Inf. Comput., 108(2):212-261, 1994.
-
(1994)
Inf. Comput.
, vol.108
, Issue.2
, pp. 212-261
-
-
Littlestone, N.1
Warmuth, M.K.2
|