-
1
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. PODS, 2007.
-
(2007)
PODS
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
4
-
-
70849095741
-
Anonymized data: Generation, models, usage
-
G. Cormode and D. Srivastava. Anonymized data: Generation, models, usage. SIGMOD, 2009.
-
(2009)
SIGMOD
-
-
Cormode, G.1
Srivastava, D.2
-
5
-
-
8344290018
-
Estimating flow distributions from sampled flow statistics
-
N. Duffield, C. Lund, and M. Thorup. Estimating flow distributions from sampled flow statistics. SIGCOMM, 2003.
-
(2003)
SIGCOMM
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
6
-
-
37049036831
-
Priority sampling for estimation of arbitrary subset sums
-
N. Duffield, C. Lund, and M. Thorup. Priority sampling for estimation of arbitrary subset sums. J. ACM, 54(6), 2007.
-
(2007)
J. ACM
, vol.54
, Issue.6
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
7
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. ICALP, pages 1-12, 2006.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
0036367429
-
Querying and mining data streams: You only get one look
-
M. Garofalakis, J. Gehrke, and R. Rastogi. Querying and mining data streams: You only get one look. SIGMOD, 2002.
-
(2002)
SIGMOD
-
-
Garofalakis, M.1
Gehrke, J.2
Rastogi, R.3
-
11
-
-
78650518102
-
Boosting the accuracy of differentially-private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially-private histograms through consistency. VLDB, 2010.
-
(2010)
VLDB
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
12
-
-
77951557924
-
A tale of two cities
-
S. Isaacman, R. Becker, R. Cáceres, S. Kobourov, J. Rowland, and A. Varshavsky. A tale of two cities. HotMobile, 2010.
-
(2010)
HotMobile
-
-
Isaacman, S.1
Becker, R.2
Cáceres, R.3
Kobourov, S.4
Rowland, J.5
Varshavsky, A.6
-
13
-
-
70849111568
-
Attacks on privacy and deFinetti's theorem
-
D. Kifer. Attacks on privacy and deFinetti's theorem. SIGMOD, 2009
-
(2009)
SIGMOD
-
-
Kifer, D.1
-
14
-
-
77954711591
-
Towards an axiomatization of statistical privacy and utility
-
D. Kifer and B.-R. Lin. Towards an axiomatization of statistical privacy and utility. PODS, 2010.
-
(2010)
PODS
-
-
Kifer, D.1
Lin, B.-R.2
-
15
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. PODS, 2010.
-
(2010)
PODS
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
16
-
-
84863967651
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. IEEE ICDE, 2008.
-
(2008)
IEEE ICDE
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
17
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. SIGMOD, 2009.
-
(2009)
SIGMOD
-
-
McSherry, F.1
-
18
-
-
84970022147
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. IEEE FOCS, 2007.
-
(2007)
IEEE FOCS
-
-
McSherry, F.1
Talwar, K.2
-
21
-
-
84964631182
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. IEEE ICDE, 2010.
-
(2010)
IEEE ICDE
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
22
-
-
79960941824
-
Differentially private data release through multidimensional partitioning
-
Y. Xiao, L. Xiong, and C. Yuan. Differentially private data release through multidimensional partitioning. VLDB SDM Workshop, 2010.
-
(2010)
VLDB SDM Workshop
-
-
Xiao, Y.1
Xiong, L.2
Yuan, C.3
|