-
1
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006) (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
2
-
-
78650804208
-
A Firm Foundation for Private Data Analysis
-
January
-
Dwork, C.: A Firm Foundation for Private Data Analysis. Communications of the ACM (January 2011)
-
(2011)
Communications of the ACM
-
-
Dwork, C.1
-
3
-
-
78650518102
-
Boosting the Accuracy of Differentially Private Histograms Through Consistency
-
Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the Accuracy of Differentially Private Histograms Through Consistency. Proceedings of the VLDB Endowment 3(1) (2010)
-
(2010)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
4
-
-
77952787160
-
Differential Privacy via Wavelet Transforms
-
IEEE
-
Xiao, X., Wang, G., Gehrke, J.: Differential Privacy via Wavelet Transforms. In: Proceedings of the 26th IEEE International Conference on Data Enginering, pp. 225-236. IEEE (2010)
-
(2010)
Proceedings of the 26th IEEE International Conference on Data Enginering
, pp. 225-236
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
5
-
-
77954715960
-
Optimizing Linear Counting Queries Under Differential Privacy
-
ACM
-
Li, C., Hay, M., Rastogi, V., Miklau, G., McGregor, A.: Optimizing Linear Counting Queries Under Differential Privacy. In: Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems of Data, pp. 123-134. ACM (2010)
-
(2010)
Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems of Data
, pp. 123-134
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
7
-
-
77951192010
-
Accurate Estimation of the Degree Distribution of Private Networks
-
IEEE
-
Hay, M., Li, C., Miklau, G., Jensen, D.: Accurate Estimation of the Degree Distribution of Private Networks. In: Proceedings of the 9th IEEE International Conference on Data Mining, pp. 169-178. IEEE (2009)
-
(2009)
Proceedings of the 9th IEEE International Conference on Data Mining
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
8
-
-
34548748619
-
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
-
IEEE
-
Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. In: Proceedings of the 26th IEEE International Conference on Data Enginering. IEEE (2007)
-
(2007)
Proceedings of the 26th IEEE International Conference on Data Enginering
-
-
Martin, D.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.5
-
10
-
-
65449162734
-
Composition Attacks and Auxiliary Information in Data Privacy
-
ACM
-
Ganta, S., Kasiviswanathan, S., Smith, A.: Composition Attacks and Auxiliary Information in Data Privacy. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 265-273. ACM (2008)
-
(2008)
Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 265-273
-
-
Ganta, S.1
Kasiviswanathan, S.2
Smith, A.3
|