-
1
-
-
70349161954
-
The uniform hardcore lemma via approximate bregman projections
-
BARAK, B., HARDT, M., AND KALE, S. The Uniform Hardcore Lemma via Approximate Bregman Projections. In SODA (2009), pp. 1193-1200.
-
(2009)
SODA
, pp. 1193-1200
-
-
Barak, B.1
Hardt, M.2
Kale, S.3
-
2
-
-
33244468835
-
Practical privacy: The sulq framework
-
BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: the sulq framework. In PODS (2005).
-
(2005)
PODS
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
85047802462
-
A learning theory approach to non-interactive database privacy
-
BLUM, A., LIGETT, K., AND ROTH, A. A learning theory approach to non-interactive database privacy. In STOC (2008).
-
(2008)
STOC
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
4
-
-
1142275486
-
Revealing information while preserving privacy
-
DINUR, I., AND NISSIM, K. Revealing information while preserving privacy. In PODS (2003).
-
(2003)
PODS
-
-
Dinur, I.1
Nissim, K.2
-
5
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
DWORK, C., MCSHERRY, F., NISSIM, K., AND SMITH, A. Calibrating noise to sensitivity in private data analysis. In TCC (2006).
-
(2006)
TCC
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
6
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
DWORK, C., NAOR, M., REINGOLD, O., ROTHBLUM, G., AND VADHAN, S. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC (2009).
-
(2009)
STOC
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.4
Vadhan, S.5
-
7
-
-
84871959002
-
The privacy of the analyst and the power of the state
-
DWORK, C., NAOR, M., AND VADHAN, S. P. The Privacy of the Analyst and The Power of the State. In FOCS (2012).
-
(2012)
FOCS
-
-
Dwork, C.1
Naor, M.2
Vadhan, S.P.3
-
8
-
-
78751522594
-
Boosting and differential privacy
-
DWORK, C., ROTHBLUM, G. N., AND VADHAN, S. P. Boosting and Differential Privacy. In FOCS (2010), pp. 51-60.
-
(2010)
FOCS
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.N.2
Vadhan, S.P.3
-
9
-
-
0030419058
-
Game theory, on-line prediction and boosting
-
ACM
-
FREUND, Y., AND SCHAPIRE, R. Game theory, on-line prediction and boosting. In Proceedings of the ninth annual conference on Computational learning theory (1996), ACM, pp. 325-332.
-
(1996)
Proceedings of the Ninth Annual Conference on Computational Learning Theory
, pp. 325-332
-
-
Freund, Y.1
Schapire, R.2
-
10
-
-
79959740503
-
Privately releasing conjunctions and the statistical query barrier
-
GUPTA, A., HARDT, M., ROTH, A., AND ULLMAN, J. Privately releasing conjunctions and the statistical query barrier. In STOC (2011).
-
(2011)
STOC
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
11
-
-
84876039577
-
Iterative constructions and private data release
-
GUPTA, A., ROTH, A., AND ULLMAN, J. Iterative constructions and private data release. In TCC (2012).
-
(2012)
TCC
-
-
Gupta, A.1
Roth, A.2
Ullman, J.3
-
12
-
-
84877755332
-
A simple and practical algorithm for differentially private data release
-
HARDT, M., LIGETT, K., AND MCSHERRY, F. A simple and practical algorithm for differentially private data release. BIPS (2012).
-
(2012)
BIPS
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
13
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
HARDT, M., AND ROTHBLUM, G. N. A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis. In FOCS (2010), pp. 61-70.
-
(2010)
FOCS
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
15
-
-
79960379430
-
What can we learn privately?
-
KASIVISWANATHAN, S., LEE, H., NISSIM, K., RASKHODNIKOVA, S., AND SMITH, A. What can we learn privately? SIAM Journal on Computing 40, 3 (2011), 793-826.
-
(2011)
SIAM Journal on Computing
, vol.40
, Issue.3
, pp. 793-826
-
-
Kasiviswanathan, S.1
Lee, H.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
16
-
-
84879748430
-
-
arXiv preprint arXiv:1207.4084
-
KEARNS, M., PAI, M., ROTH, A., AND ULLMAN, J. Mechanism design in large games: Incentives and privacy. arXiv preprint arXiv:1207.4084 (2012).
-
(2012)
Mechanism Design in Large Games: Incentives and Privacy
-
-
Kearns, M.1
Pai, M.2
Roth, A.3
Ullman, J.4
-
17
-
-
78751557330
-
The limits of two-party differential privacy
-
IEEE
-
MCGREGOR, A., MIRONOV, I., PITASSI, T., REINGOLD, O., TALWAR, K., AND VADHAN, S. The limits of two-party differential privacy. In Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on (2010), IEEE, pp. 81-90.
-
(2010)
Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.6
-
18
-
-
46749128577
-
Mechanism design via differential privacy
-
MCSHERRY, F., AND TALWAR, K. Mechanism design via differential privacy. In FOCS (2007).
-
(2007)
FOCS
-
-
McSherry, F.1
Talwar, K.2
-
21
-
-
77954745685
-
Interactive privacy via the median mechanism
-
ROTH, A., AND ROUGHGARDEN, T. Interactive privacy via the median mechanism. In STOC (2010).
-
(2010)
STOC
-
-
Roth, A.1
Roughgarden, T.2
|