-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in Proceedings of PODS '01, P. Buneman, ed., ACM, New York, 2001, pp. 247-255. (Pubitemid 32865987)
-
(2001)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, Privacy-preserving data mining, SIGMOD Rec., 29 (2000), pp. 439-450.
-
(2000)
SIGMOD Rec.
, vol.29
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
S. Agrawal and J. R. Haritsa, A framework for high-accuracy privacy-preserving mining, in Proceedings of ICDE '05, K. Aberer, M. Franklin, and S. Nishio, eds., IEEE, Washington, DC, 2005, pp. 193-204. (Pubitemid 41731131)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
4
-
-
70349358874
-
More on average case vs approximation complexity
-
P. Beame, ed., IEEE, Washington, DC
-
M. Alekhnovich, More on average case vs approximation complexity, in Proceedings of FOCS, P. Beame, ed., IEEE, Washington, DC, 2003, pp. 298-307.
-
(2003)
Proceedings of FOCS
, pp. 298-307
-
-
Alekhnovich, M.1
-
5
-
-
35048857810
-
Cryptographic randomized response techniques
-
Springer, Berlin
-
A. Ambainis, M. Jakobsson, and H. Lipmaa, Cryptographic randomized response techniques, in PKC, Lecture Notes in Comput. Sci. 2947, Springer, Berlin, 2004, pp. 425-438.
-
(2004)
PKC, Lecture Notes in Comput. Sci.
, vol.2947
, pp. 425-438
-
-
Ambainis, A.1
Jakobsson, M.2
Lipmaa, H.3
-
6
-
-
0018454769
-
Fast probabilistic algorithms for hamiltonian circuits and matchings
-
DOI 10.1016/0022-0000(79)90045-X
-
D. Angluin and L. G. Valiant, Fast probabilistic algorithms for hamiltonian circuits and matchings, J. Comput. System Sci., 18 (1979), pp. 155-193. (Pubitemid 9461409)
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 155-193
-
-
Angluin, D.1
Valiant, L.G.2
-
7
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
DOI 10.1145/1265530.1265569, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar, Privacy, accuracy, and consistency too: A holistic solution to contingency table release, in Proceedings of PODS '05, P. Kolaitis and L. Libkin, eds., ACM, New York, 2007, pp. 273-282. (Pubitemid 47620902)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
8
-
-
77949617188
-
Bounds on the sample complexity for private learning and private data release
-
Daniele Micciancio, ed., Springer, Berlin
-
A. Beimel, S. P. Kasiviswanathan, and K. Nissim, Bounds on the sample complexity for private learning and private data release, in Theory of Cryptography Conference (TCC), Lecture Notes in Comput. Sci. 5978, Daniele Micciancio, ed., Springer, Berlin, 2010, pp. 437-454.
-
(2010)
Theory of Cryptography Conference (TCC), Lecture Notes in Comput. Sci.
, vol.5978
, pp. 437-454
-
-
Beimel, A.1
Kasiviswanathan, S.P.2
Nissim, K.3
-
9
-
-
38049071427
-
Stability of k-means clustering
-
N. H. Bshouty and C. Gentile, eds., Springer, Berlin
-
S. Ben-David, D. Pál, and H.-U. Simon, Stability of k-means clustering, in COLT '07: Proceedings of the 20th Annual Conference on Learning Theory, N. H. Bshouty and C. Gentile, eds., Springer, Berlin, 2007, pp. 20-34.
-
(2007)
COLT '07: Proceedings of the 20th Annual Conference on Learning Theory
, pp. 20-34
-
-
Ben-David, S.1
Pál, D.2
Simon, H.-U.3
-
10
-
-
33746099301
-
A sober look at clustering stability
-
Learning Theory - 19th Annual Conference on Learning Theory, COLT 2006, Proceedings
-
S. Ben-David, U. von Luxburg, and D. Pál, A sober look at clustering stability, in Learning Theory, Lecture Notes in Comput. Sci. 4005, Springer, Berlin, 2006, pp. 5-19. (Pubitemid 44072182)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4005 LNAI
, pp. 5-19
-
-
Ben-David, S.1
Von Luxburg, U.2
Pal, D.3
-
11
-
-
33244468835
-
Practical privacy: The SulQ framework
-
DOI 10.1145/1065167.1065184, Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2005
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim, Practical privacy: The SuLQ framework, in Proceedings of PODS '05, G. Gottlob and F. Afrati, eds., ACM, New York, 2005, pp. 128-138. (Pubitemid 43275476)
-
(2005)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
12
-
-
0028062299
-
Weakly learning DNF and characterizing statistical query learning using Fourier analysis
-
F. T. Leighton and M. Goodrich, eds., ACM, New York
-
A. Blum, M. L. Furst, J. Jackson, M. J. Kearns, Y. Mansour, and S. Rudich, Weakly learning DNF and characterizing statistical query learning using Fourier analysis, in Proceedings of STOC '94, F. T. Leighton and M. Goodrich, eds., ACM, New York, 1994, pp. 253-262.
-
(1994)
Proceedings of STOC '94
, pp. 253-262
-
-
Blum, A.1
Furst, M.L.2
Jackson, J.3
Kearns, M.J.4
Mansour, Y.5
Rudich, S.6
-
13
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
DOI 10.1145/792538.792543
-
A. Blum, A. Kalai, and H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model, J. ACM, 50 (2003), pp. 506-519. (Pubitemid 43906335)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
14
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
R. Ladner and C. Dwork, eds., ACM, New York
-
A. Blum, K. Ligett, and A Roth, A learning theory approach to non-interactive database privacy, in Proceedings of STOC '08, R. Ladner and C. Dwork, eds., ACM, New York, 2008, pp. 609-618.
-
(2008)
Proceedings of STOC '08
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
15
-
-
0023646365
-
Occam's razor Inform
-
A. Blumer, A. Ehrenfeucht, D. Haussler, and K. M. Warmuth, Occam's razor, Inform. Process. Lett., 24 (1987), pp. 377-380.
-
(1987)
Process. Lett.
, vol.24
, pp. 377-380
-
-
Blumer, A.1
Ehrenfeucht, A.2
Haussler, D.3
Warmuth, K.M.4
-
17
-
-
0037708179
-
On using extended statistical queries to avoid membership queries
-
DOI 10.1162/153244302760200669
-
N. H. Bshouty and V. Feldman, On using extended statistical queries to avoid membership queries, J. Mach. Learn. Res., 2 (2002), pp. 359-395. (Pubitemid 135712566)
-
(2002)
Journal of Machine Learning Research
, vol.2
, Issue.3
, pp. 359-395
-
-
Bshouty, N.H.1
Feldman, V.2
-
19
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations, Ann. Math. Statist., 23 (1952), pp. 493-507.
-
(1952)
Ann. Math. Statist.
, vol.23
, pp. 493-507
-
-
Chernoff, H.1
-
20
-
-
0018520640
-
Distribution-free performance bounds for potential function rules
-
L. Devroye and T. Wagner, Distribution-free performance bounds for potential function rules, IEEE Trans. Inform. Theory, 25 (1979), pp. 601-604. (Pubitemid 10426456)
-
(1979)
IEEE Transactions on Information Theory
, vol.IT-25
, Issue.5
, pp. 601-604
-
-
Devroye Luc, P.1
Wagner, T.J.2
-
21
-
-
1142275486
-
Revealing information while preserving privacy
-
F. Neven, C. Beeri, and T. Milo, eds., ACM, New York
-
I. Dinur and K. Nissim, Revealing information while preserving privacy, in Proceedings of PODS '03, F. Neven, C. Beeri, and T. Milo, eds., ACM, New York, 2003, pp. 202-210.
-
(2003)
Proceedings of PODS '03
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
22
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork, Differential privacy, in Automata, Languages, and Programming, Lecture Notes in Comput. Sci. 4052, Springer, Berlin, 2006, pp. 1-12. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052 LNCS
, pp. 1-12
-
-
Dwork, C.1
-
23
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, in Advances in Cryptology, Lecture Notes in Comput. Sci. 4004, Springer, Berlin, 2006, pp. 486-503. (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
24
-
-
70350682013
-
Differential privacy and robust statistics
-
M. Mitzenmacher, ed., ACM, New York
-
C. Dwork and J. Lei, Differential privacy and robust statistics, in Proceedings of STOC '09, M. Mitzenmacher, ed., ACM, New York, 2009, pp. 371-380.
-
(2009)
Proceedings of STOC '09
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
25
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, Calibrating noise to sensitivity in private data analysis, in Theory of Cryptology, Lecture Notes in Comput. Sci. 3876, Springer, Berlin, 2006, pp. 265-284. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
26
-
-
35449000081
-
The price of privacy and the limits of LP decoding
-
DOI 10.1145/1250790.1250804, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
C. Dwork, F. McSherry, and K. Talwar, The price of privacy and the limits of LP decoding, in Proceedings of STOC '07, R. Ladner and U. Feige, eds., ACM, New York, 2007, pp. 85-94. (Pubitemid 47630724)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 85-94
-
-
Dwork, C.1
McSherry, F.2
Talwar, K.3
-
27
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Springer, Berlin
-
C. Dwork and K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in Advances in Cryptography, Lecture Notes in Comput. Sci. 3152, Springer, Berlin, 2004, pp. 528-544.
-
(2004)
Advances in Cryptography, Lecture Notes in Comput. Sci.
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
28
-
-
51849089628
-
New efficient attacks on statistical disclosure control
-
Springer, Berlin
-
C. Dwork and S. Yekahnin, New efficient attacks on statistical disclosure control, in Advances in Cryptology, Lecture Notes in Comput. Sci. 5157, Springer, Berlin, 2008, pp. 469-480.
-
(2008)
Advances in Cryptology, Lecture Notes in Comput. Sci.
, vol.5157
, pp. 469-480
-
-
Dwork, C.1
Yekahnin, S.2
-
29
-
-
21844448886
-
Stability of randomized learning algorithms
-
A. Elisseeff, T. Evgeniou, and M. Pontil, Stability of randomized learning algorithms, J. Mach. Learn. Res., 6 (2005), pp. 55-79.
-
(2005)
J. Mach. Learn. Res.
, vol.6
, pp. 55-79
-
-
Elisseeff, A.1
Evgeniou, T.2
Pontil, M.3
-
30
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
ACM, New York
-
A. Evfimievski, J. Gehrke, and R. Srikant, Limiting privacy breaches in privacy preserving data mining, in Proceedings of PODS '03, ACM, New York, 2003, pp. 211-222.
-
(2003)
Proceedings of PODS '03
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
31
-
-
0026820701
-
On learning ring-sum-expansions
-
P. Fischer and H.-U. Simon, On learning ring-sum-expansions, SIAM J. Comput., 21 (1992), pp. 181-192.
-
(1992)
SIAM J. Comput.
, vol.21
, pp. 181-192
-
-
Fischer, P.1
Simon, H.-U.2
-
32
-
-
24344500472
-
Generalization bounds for averaged classifiers
-
DOI 10.1214/009053604000000058
-
Y. Freund, Y. Mansour, and R. E. Schapire, Generalization bounds for averaged classifiers, Ann. Statist., 32 (2004), pp. 1698-1722. (Pubitemid 41250282)
-
(2004)
Annals of Statistics
, vol.32
, Issue.4
, pp. 1698-1722
-
-
Freund, Y.1
Mansour, Y.2
Schapire, R.E.3
-
33
-
-
0002192516
-
Decision theoretic generalizations of the PAC model for neural net and other learning applications
-
D. Haussler, Decision theoretic generalizations of the PAC model for neural net and other learning applications, Inform. and Comput., 100 (1992), pp. 78-150.
-
(1992)
Inform. and Comput.
, vol.100
, pp. 78-150
-
-
Haussler, D.1
-
34
-
-
0038722515
-
Learning integer lattices
-
D. Helmbold, R. Sloan, and M. K. Warmuth, Learning integer lattices, SIAM J. Comput., 21 (1992), pp. 240-266.
-
(1992)
SIAM J. Comput.
, vol.21
, pp. 240-266
-
-
Helmbold, D.1
Sloan, R.2
Warmuth, M.K.3
-
35
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding, Probability inequalities for sums of bounded random variables, J. Amer. Statist. Assoc., 58 (1963), pp. 13-30.
-
(1963)
J. Amer. Statist. Assoc.
, vol.58
, pp. 13-30
-
-
Hoeffding, W.1
-
36
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - ASIACRYPT 2001
-
N. J. Hopper and M. Blum, Secure human identification protocols, in Advances in Cryptology, Lecture Notes in Comput. Sci. 2248, Springer, Berlin, 2001, pp. 52-66. (Pubitemid 33371178)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
38
-
-
57949111704
-
What can we learn privately?
-
R. Ravi, ed., IEEE, Washington, DC
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith, What can we learn privately?, in Proceedings of FOCS, R. Ravi, ed., IEEE, Washington, DC, 2008, pp. 559-569.
-
(2008)
Proceedings of FOCS
, pp. 559-569
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
40
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
M. Kearns, Efficient noise-tolerant learning from statistical queries, J. ACM, 45 (1998), pp. 983-1006.
-
(1998)
J. ACM
, vol.45
, pp. 983-1006
-
-
Kearns, M.1
-
41
-
-
0033566418
-
Algorithmic stability and sanity-check bounds for leave-one-out crossvalidation
-
M. Kearns and D. Ron, Algorithmic stability and sanity-check bounds for leave-one-out crossvalidation, Neural Comput., 11 (1999), pp. 1427-1453.
-
(1999)
Neural Comput.
, vol.11
, pp. 1427-1453
-
-
Kearns, M.1
Ron, D.2
-
42
-
-
0001553979
-
Toward efficient agnostic learning
-
M. J. Kearns, R. E. Schapire, and L. M. Sellie, Toward efficient agnostic learning, Mach. Learn., 17 (1994), pp. 115-141.
-
(1994)
Mach. Learn.
, vol.17
, pp. 115-141
-
-
Kearns, M.J.1
Schapire, R.E.2
Sellie, L.M.3
-
44
-
-
3142674150
-
Almost-everywhere algorithmic stability and generalization error
-
Association for Uncertainty in Artificial Intelligence
-
S. Kutin and P. Niyogi, Almost-everywhere algorithmic stability and generalization error, in Proceedings of UAI, Association for Uncertainty in Artificial Intelligence, 2002, pp. 275-282.
-
(2002)
Proceedings of UAI
, pp. 275-282
-
-
Kutin, S.1
Niyogi, P.2
-
45
-
-
46749128577
-
Mechanism design via differential privacy
-
A. Sinclair, ed., IEEE, Washington, DC
-
F. McSherry and K. Talwar, Mechanism design via differential privacy, in Proceedings of FOCS, A. Sinclair, ed., IEEE, Washington, DC, 2007, pp. 94-103.
-
(2007)
Proceedings of FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
46
-
-
34250642810
-
Privacy via pseudorandom sketches
-
DOI 10.1145/1142351.1142373, Proceedings of the Twenty-Fifth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2006
-
N. Mishra and M. Sandler, Privacy via pseudorandom sketches, in Proceedings of PODS '06, S. Vansummeren, ed., ACM, New York, 2006, pp. 143-152. (Pubitemid 46946476)
-
(2006)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 143-152
-
-
Mishra, N.1
Sandler, M.2
-
47
-
-
33746074801
-
Polling with physical envelopes: A rigorous analysis of a human-centric protocol
-
DOI 10.1007/11761679-7, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
T. Moran and M. Naor, Polling with physical envelopes: A rigorous analysis of a humancentric protocol, in Advances in Cryptology, Lecture Notes in Comput. Sci. 4004, Springer, Berlin, 2006, pp. 88-108. (Pubitemid 44072235)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 88-108
-
-
Moran, T.1
Naor, M.2
-
48
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
DOI 10.1145/1250790.1250803, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
K. Nissim, S. Raskhodnikova, and A. Smith, Smooth sensitivity and sampling in private data analysis, in Proceedings of STOC '07, R. Ladner and U. Feige, eds., ACM, New York, 2007, pp. 75-84. (Pubitemid 47630723)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
49
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
VLDB Endowment, Vienna, Austria
-
V. Rastogi, S. Hong, and D. Suciu, The boundary between privacy and utility in data publishing, in Proceedings of VLDB '07, VLDB Endowment, Vienna, Austria, 2007, pp. 531-542.
-
(2007)
Proceedings of VLDB '07
, pp. 531-542
-
-
Rastogi, V.1
Hong, S.2
Suciu, D.3
-
50
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, J. ACM, 56 (2009), pp. 1-40.
-
(2009)
J. ACM
, vol.56
, pp. 1-40
-
-
Regev, O.1
-
52
-
-
0021518106
-
A theory of the learnable
-
L. G. Valiant, A theory of the learnable, Commun. of the ACM, 27 (1984), pp. 1134-1142.
-
(1984)
Commun. of the ACM
, vol.27
, pp. 1134-1142
-
-
Valiant, L.G.1
-
53
-
-
0036678198
-
Randomized response, statistical disclosure control and misclassification: A review
-
A. van den Hout and P. G. M. van der Heijden, Randomized response, statistical disclosure control and misclassification: A review, Internat. Statist. Rev., 70 (2002), pp. 269-288.
-
(2002)
Internat. Statist. Rev.
, vol.70
, pp. 269-288
-
-
Van Den Hout, A.1
Van Der Heijden, P.G.M.2
-
54
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner, Randomized response: A survey technique for eliminating evasive answer bias, J. Amer. Statist. Assoc., 60 (1965), pp. 63-69.
-
(1965)
J. Amer. Statist. Assoc.
, vol.60
, pp. 63-69
-
-
Warner, S.L.1
-
55
-
-
77952555772
-
A statistical framework for differential privacy
-
L. Wasserman and S. Zhou, A statistical framework for differential privacy, J. Amer. Statist. Assoc., 105 (2010), pp. 375-389.
-
(2010)
J. Amer. Statist. Assoc.
, vol.105
, pp. 375-389
-
-
Wasserman, L.1
Zhou, S.2
-
56
-
-
17444425308
-
New lower bounds for statistical query learning
-
DOI 10.1016/j.jcss.2004.10.003, PII S0022000004001291, COLT 2002
-
K. Yang, New lower bounds for statistical query learning, J. Comput. System Sci., 70 (2005), pp. 485-509. (Pubitemid 40537241)
-
(2005)
Journal of Computer and System Sciences
, vol.70
, Issue.4
, pp. 485-509
-
-
Yang, K.1
-
57
-
-
70449464977
-
Differential privacy with compression
-
R. Calderbank, H. Chung, and A. Orlitsky, eds., IEEE, Washington, DC
-
S. Zhou, K. Ligett, and L. Wasserman, Differential privacy with compression, in IEEE International Symposium on Information Theory, R. Calderbank, H. Chung, and A. Orlitsky, eds., IEEE, Washington, DC, 2009, pp. 2718-2722.
-
(2009)
IEEE International Symposium on Information Theory
, pp. 2718-2722
-
-
Zhou, S.1
Ligett, K.2
Wasserman, L.3
|