-
1
-
-
77956635961
-
Strategyproof approximation of the minimax on networks
-
Noga Alon, Michal Feldman, Ariel D. Procaccia, and Moshe Tennenholtz. Strategyproof approximation of the minimax on networks. Mathematics of Operations Research, 35(3):513-526, 2010.
-
(2010)
Mathematics of Operations Research
, vol.35
, Issue.3
, pp. 513-526
-
-
Alon, N.1
Feldman, M.2
Procaccia, A.D.3
Tennenholtz, M.4
-
2
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank Mcsherry, and Kunal Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In Proc. of 26th PODS, pages 273-282, 2007.
-
(2007)
Proc. of 26th PODS
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
Mcsherry, F.5
Talwar, K.6
-
3
-
-
85047802462
-
A learning theory approach to non-interactive database privacy
-
Avrim Blum, Katrina Ligett, and Aaron Roth. A learning theory approach to non-interactive database privacy. In Proc. 40'th STOC, pages 609-618, 2008.
-
(2008)
Proc. 40'th STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
84863508343
-
Truthful mechanisms for agents that value privacy
-
abs/1111.5472
-
Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, and Salil P. Vadhan. Truthful mechanisms for agents that value privacy. CoRR, abs/1111.5472, 2011.
-
(2011)
CoRR
-
-
Chen, Y.1
Chong, S.2
Kash, I.A.3
Moran, T.4
Vadhan, S.P.5
-
5
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 5:429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.5
, pp. 429-444
-
-
Dalenius, T.1
-
6
-
-
84858307870
-
Lower bounds in differential privacy
-
Anindya De. Lower bounds in differential privacy. In TCC, pages 321-338, 2012.
-
(2012)
TCC
, pp. 321-338
-
-
De, A.1
-
7
-
-
1142275486
-
Revealing information while preserving privacy
-
ACM Press
-
Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In In PODS, pages 202-210. ACM Press, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
8
-
-
33746335051
-
Differential privacy
-
Springer
-
Cynthia Dwork. Differential privacy. In In Proc. ICALP, pages 1-12. Springer, 2006.
-
(2006)
Proc. ICALP
, pp. 1-12
-
-
Dwork, C.1
-
9
-
-
70349305273
-
Differential privacy: A survey of results
-
Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li, editors, Theory and Applications of Models of Computation, Springer Berlin / Heidelberg
-
Cynthia Dwork. Differential privacy: A survey of results. In Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li, editors, Theory and Applications of Models of Computation, volume 4978 of Lecture Notes in Computer Science, pages 1-19. Springer Berlin / Heidelberg, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
Cynthia Dwork, Krishnaram Kenthapadi, Frank Mcsherry, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In In EUROCRYPT, pages 486-503. Springer, 2006.
-
(2006)
EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
Mcsherry, F.3
Naor, M.4
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In In Proc. of the 3rd TCC, pages 265-284. Springer, 2006.
-
(2006)
Proc. of the 3rd TCC
, pp. 265-284
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
ACM
-
Cynthia Dwork, Moni Naor, Omer Reingold, Guy N. Rothblum, and Salil Vadhan. On the complexity of differentially private data release: Efficient algorithms and hardness results. In Proc. 41'st STOC, STOC '09, pages 381-390. ACM, 2009.
-
(2009)
Proc. 41'st STOC, STOC '09
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
13
-
-
78751522594
-
Boosting and differential privacy
-
Cynthia Dwork, Guy N. Rothblum, and Salil P. Vadhan. Boosting and differential privacy. In FOCS, pages 51-60, 2010.
-
(2010)
FOCS
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.N.2
Vadhan, S.P.3
-
14
-
-
77954754217
-
Approximate privacy: Foundations and quantification (extended abstract)
-
New York, NY, USA, ACM
-
Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira. Approximate privacy: foundations and quantification (extended abstract). In Proc. 11th EC, EC '10, pages 167-178, New York, NY, USA, 2010. ACM.
-
(2010)
Proc. 11th EC, EC '10
, pp. 167-178
-
-
Feigenbaum, J.1
Jaggard, A.D.2
Schapira, M.3
-
15
-
-
70350700899
-
Private coresets
-
New York, NY, USA, ACM
-
Dan Feldman, Amos Fiat, Haim Kaplan, and Kobbi Nissim. Private coresets. In Proc. 41st STOC, STOC '09, pages 361-370, New York, NY, USA, 2009. ACM.
-
(2009)
Proc. 41st STOC, STOC '09
, pp. 361-370
-
-
Feldman, D.1
Fiat, A.2
Kaplan, H.3
Nissim, K.4
-
16
-
-
0002646970
-
On the question of statistical confidentiality
-
I. Fellegi. On the question of statistical confidentiality. J. of the Amer. Stat. Assoc., 67:7-18, 1972.
-
(1972)
J. of the Amer. Stat. Assoc.
, vol.67
, pp. 7-18
-
-
Fellegi, I.1
-
17
-
-
84863535268
-
Approximately optimal auctions for selling privacy when costs are correlated with data
-
New York, NY, USA, ACM
-
Lisa K. Fleischer and Yu-Han Lyu. Approximately optimal auctions for selling privacy when costs are correlated with data. In Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12, pages 568-585, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12
, pp. 568-585
-
-
Fleischer, L.K.1
Lyu, Y.-H.2
-
18
-
-
79959622530
-
Selling privacy at auction
-
New York, NY, USA, ACM. ISBN 978-1-4503-0261-6
-
Arpita Ghosh and Aaron Roth. Selling privacy at auction. In Proc. 12th EC, EC '11, pages 199-208, New York, NY, USA, 2011. ACM. ISBN 978-1-4503-0261-6.
-
(2011)
Proc. 12th EC, EC '11
, pp. 199-208
-
-
Ghosh, A.1
Roth, A.2
-
19
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
ACM
-
Arpita Ghosh, Tim Roughgarden, and Mukund Sundararajan. Universally utility-maximizing privacy mechanisms. In Proc. 41'st STOC, STOC '09, pages 351-360. ACM, 2009.
-
(2009)
Proc. 41'st STOC, STOC '09
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
21
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Washington, DC, USA, IEEE Computer Society. doi: 10.1109/FOCS.2010.85
-
Moritz Hardt and Guy N. Rothblum. A multiplicative weights mechanism for privacy-preserving data analysis. In Proc. 51'st FOCS, pages 61-70, Washington, DC, USA, 2010. IEEE Computer Society. doi: 10.1109/FOCS.2010.85.
-
(2010)
Proc. 51'st FOCS
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
22
-
-
77954711905
-
On the geometry of differential privacy
-
New York, NY, USA, ACM. ISBN 978-1-4503-0050-6. doi: 10.1145/1806689. 1806786
-
Moritz Hardt and Kunal Talwar. On the geometry of differential privacy. In Proc. 42nd STOC, pages 705-714, New York, NY, USA, 2010. ACM. ISBN 978-1-4503-0050-6. doi: 10.1145/1806689.1806786.
-
(2010)
Proc. 42nd STOC
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
23
-
-
84871966152
-
The exponential mechanism for social welfare: Private, truthful, and nearly optimal
-
To appear. Available at
-
Zhiyi Huang and Sampath Kannan. The exponential mechanism for social welfare: Private, truthful, and nearly optimal. In Proc. FOCS '12, 2012. To appear. Available at http://arxiv.org/abs/1204.1255.
-
Proc. FOCS '12, 2012
-
-
Huang, Z.1
Kannan, S.2
-
24
-
-
57949111704
-
What can we learn privately?
-
Washington, DC, USA, IEEE
-
Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. What can we learn privately? In Proc. 49th FOCS, pages 531-540, Washington, DC, USA, 2008. IEEE.
-
(2008)
Proc. 49th FOCS
, pp. 531-540
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
25
-
-
84893270473
-
Take it or leave it: Running a survey when privacy comes at a cost
-
abs/1202.4741
-
Katrina Ligett and Aaron Roth. Take it or leave it: Running a survey when privacy comes at a cost. CoRR, abs/1202.4741, 2012.
-
(2012)
CoRR
-
-
Ligett, K.1
Roth, A.2
-
26
-
-
77954723331
-
Asymptotically optimal strategy-proof mechanisms for two-facility games
-
ACM
-
Pinyan Lu, Xiaorui Sun, Yajun Wang, and Zeyuan Allen Zhu. Asymptotically optimal strategy-proof mechanisms for two-facility games. In Proceedings of the 11th ACM conference on Electronic commerce, EC '10, pages 315-324. ACM, 2010.
-
(2010)
Proceedings of the 11th ACM Conference on Electronic Commerce, EC '10
, pp. 315-324
-
-
Lu, P.1
Sun, X.2
Wang, Y.3
Zhu, Z.A.4
-
28
-
-
0000983963
-
On strategy-proofness and single peakedness
-
H. Moulin. On strategy-proofness and single peakedness. Public Choice, 35:437-455, 1980.
-
(1980)
Public Choice
, vol.35
, pp. 437-455
-
-
Moulin, H.1
-
29
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Smooth sensitivity and sampling in private data analysis. In Proc. 39th STOC, pages 75-84, 2007.
-
(2007)
Proc. 39th STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
30
-
-
84863503074
-
Privacy-aware mechanism design
-
New York, NY, USA, ACM
-
Kobbi Nissim, Claudio Orlandi, and Rann Smorodinsky. Privacy-aware mechanism design. In Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12, pages 774-789, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12
, pp. 774-789
-
-
Nissim, K.1
Orlandi, C.2
Smorodinsky, R.3
-
31
-
-
84856434218
-
Approximately optimal mechanism design via differential privacy
-
New York, NY, USA, ACM. ISBN 978-1-4503-1115-1
-
Kobbi Nissim, Rann Smorodinsky, and Moshe Tennenholtz. Approximately optimal mechanism design via differential privacy. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12, pages 203-213, New York, NY, USA, 2012. ACM. ISBN 978-1-4503-1115-1.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12
, pp. 203-213
-
-
Nissim, K.1
Smorodinsky, R.2
Tennenholtz, M.3
-
32
-
-
84863535449
-
Conducting truthful surveys, cheaply
-
New York, NY, USA, ACM
-
Aaron Roth and Grant Schoenebeck. Conducting truthful surveys, cheaply. In Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12, pages 826-843, New York, NY, USA, 2012. ACM.
-
(2012)
Proceedings of the 13th ACM Conference on Electronic Commerce, EC '12
, pp. 826-843
-
-
Roth, A.1
Schoenebeck, G.2
-
33
-
-
84926076707
-
Mechanism design without money
-
N. Nisan, T. Roughgarden, E. Tardos, and V. Vazirani, editors, chapter 10, Cambridge University Press
-
J. Schummer and R. V. Vohra. Mechanism design without money. In N. Nisan, T. Roughgarden, E. Tardos, and V. Vazirani, editors, Algorithmic Game Theory, chapter 10, pages 243-266. Cambridge University Press, 2007.
-
(2007)
Algorithmic Game Theory
, pp. 243-266
-
-
Schummer, J.1
Vohra, R.V.2
-
35
-
-
84863536399
-
Is privacy compatible with truthfulness?
-
ePrint Archive, Report 2011/005
-
David Xiao. Is privacy compatible with truthfulness? Cryptology ePrint Archive, Report 2011/005, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology
-
-
Xiao, D.1
|