-
1
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
BARAK, B., CHAUDHURI, K., DWORK, C., KALE, S., MCSHERRY, F., AND TALWAR, K. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS (2007), pp. 273-282.
-
(2007)
PODS
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
2
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: the SuLQ framework. In PODS (2005), pp. 128-138.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
R. E. Ladner and C. Dwork, Eds., ACM
-
BLUM, A., LIGETT, K., AND ROTH, A. A learning theory approach to non-interactive database privacy. In STOC (2008), R. E. Ladner and C. Dwork, Eds., ACM, pp. 609-618.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
84867135103
-
Sample complexity bounds for differentially private learning
-
CHAUDHURI, K., AND HSU, D. Sample complexity bounds for differentially private learning. In COLT (2011).
-
(2011)
COLT
-
-
Chaudhuri, K.1
Hsu, D.2
-
5
-
-
84867127144
-
Convergence rates for differentially private statistical estimation
-
CHAUDHURI, K., AND HSU, D. Convergence rates for differentially private statistical estimation. In ICML (2012).
-
(2012)
ICML
-
-
Chaudhuri, K.1
Hsu, D.2
-
6
-
-
79955858775
-
Differentially private empirical risk minimization
-
March
-
CHAUDHURI, K., MONTELEONI, C., AND SARWATE, A. D. Differentially private empirical risk minimization. Journal of Machine Learning Research 12 (March 2011), 1069-1109.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
7
-
-
84877749760
-
-
Lecture Notes in Statistics. Springer, New York
-
CHIKUSE, Y. Statistics on Special Manifolds. No. 174 in Lecture Notes in Statistics. Springer, New York, 2003.
-
(2003)
Statistics on Special Manifolds
, Issue.174
-
-
Chikuse, Y.1
-
8
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DWORK, C., KENTHAPADI, K., MCSHERRY, F., MIRONOV, I., AND NAOR, M. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT (2006), vol. 4004, pp. 486-503.
-
(2006)
EUROCRYPT
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DWORK, C., MCSHERRY, F., NISSIM, K., AND SMITH, A. Calibrating noise to sensitivity in private data analysis. In 3rd IACR Theory of Cryptography Conference, (2006), pp. 265-284.
-
(2006)
3rd IACR Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
10
-
-
77956195013
-
Data mining with differential privacy
-
FRIEDMAN, A., AND SCHUSTER, A. Data mining with differential privacy. In KDD (2010), pp. 493-502.
-
(2010)
KDD
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
11
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
(June) 53 pages
-
FUNG, B. C. M., WANG, K., CHEN, R., AND YU, P. S. Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42, 4 (June 2010), 53 pages.
-
(2010)
ACM Comput. Surv.
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
12
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
GANTA, S. R., KASIVISWANATHAN, S. P., AND SMITH, A. Composition attacks and auxiliary information in data privacy. In KDD (2008), pp. 265-273.
-
(2008)
KDD
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
13
-
-
67649637295
-
Privacy-preserving singular value decomposition
-
29 2009-april 2
-
HAN, S., NG, W. K., AND YU, P. Privacy-preserving singular value decomposition. In ICDE (29 2009-april 2 2009), pp. 1267 -1270.
-
(2009)
ICDE
, pp. 1267-1270
-
-
Han, S.1
Ng, W.K.2
Yu, P.3
-
14
-
-
84862594279
-
Beating randomized response on incoherent matrices
-
HARDT, M., AND ROTH, A. Beating randomized response on incoherent matrices. In STOC (2012).
-
(2012)
STOC
-
-
Hardt, M.1
Roth, A.2
-
15
-
-
77950649162
-
Simulation of the matrix Bingham-von Mises-Fisher distribution, with applications to multivariate and relational data
-
HOFF, P. D. Simulation of the matrix Bingham-von Mises-Fisher distribution, with applications to multivariate and relational data. J. Comp. Graph. Stat. 18, 2 (2009), 438-456.
-
(2009)
J. Comp. Graph. Stat.
, vol.18
, Issue.2
, pp. 438-456
-
-
Hoff, P.D.1
-
16
-
-
84877754739
-
On differentially private low rank approximation
-
KAPRALOV, M., AND TALWAR, K. On differentially private low rank approximation. In Proc. of SODA (2013).
-
(2013)
Proc. of SODA
-
-
Kapralov, M.1
Talwar, K.2
-
18
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
LIU, K., KARGUPTA, H., AND RYAN, J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18, 1 (2006), 92-106.
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
19
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
MACHANAVAJJHALA, A., KIFER, D., ABOWD, J. M., GEHRKE, J., AND VILHUBER, L. Privacy: Theory meets practice on the map. In ICDE (2008), pp. 277-286.
-
(2008)
ICDE
, pp. 277-286
-
-
MacHanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
20
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
MCSHERRY, F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD Conference (2009), pp. 19-30.
-
(2009)
SIGMOD Conference
, pp. 19-30
-
-
McSherry, F.1
-
21
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
MCSHERRY, F., AND MIRONOV, I. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD (2009), pp. 627-636.
-
(2009)
KDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
22
-
-
46749128577
-
Mechanism design via differential privacy
-
MCSHERRY, F., AND TALWAR, K. Mechanism design via differential privacy. In FOCS (2007), pp. 94-103.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
23
-
-
80052663001
-
Differentially private data release for data mining
-
MOHAMMED, N., CHEN, R., FUNG, B. C. M., AND YU, P. S. Differentially private data release for data mining. In KDD (2011), pp. 493-501.
-
(2011)
KDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
24
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
D. S. Johnson and U. Feige, Eds. ACM
-
NISSIM, K., RASKHODNIKOVA, S., AND SMITH, A. Smooth sensitivity and sampling in private data analysis. In STOC (2007), D. S. Johnson and U. Feige, Eds., ACM, pp. 75-84.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
25
-
-
0027879547
-
On the early history of the singular value decomposition
-
SIAM
-
STEWART, G. On the early history of the singular value decomposition. SIAM Review 35, 4 (1993), 551-566.
-
(1993)
Review
, vol.35
, Issue.4
, pp. 551-566
-
-
Stewart, G.1
-
26
-
-
77952555772
-
A statistical framework for differential privacy
-
WASSERMAN, L., AND ZHOU, S. A statistical framework for differential privacy. JASA 105, 489 (2010).
-
(2010)
JASA
, vol.105
, pp. 489
-
-
Wasserman, L.1
Zhou, S.2
-
27
-
-
85161972679
-
Probabilistic inference and differential privacy
-
WILLIAMS, O., AND MCSHERRY, F. Probabilistic inference and differential privacy. In NIPS (2010).
-
(2010)
NIPS
-
-
Williams, O.1
McSherry, F.2
-
28
-
-
71449099936
-
Privacy-preserving support vector machine classification
-
ZHAN, J. Z., AND MATWIN, S. Privacy-preserving support vector machine classification. IJIIDS 1, 3/4 (2007), 356-385.
-
(2007)
IJIIDS
, vol.1
, Issue.3-4
, pp. 356-385
-
-
Zhan, J.Z.1
Matwin, S.2
|