-
1
-
-
82655168678
-
A baseline for the multivariate comparison of resting state networks
-
doi: 10.3389/fnsys.2011.00002
-
Allen, E. A., Erhardt, E. B., Damaraju, E., Gruner, W., Segall, J. M., Silva, R. F., et al. (2011). A baseline for the multivariate comparison of resting state networks. Front. Syst. Neurosci. 5:2. doi: 10.3389/fnsys.2011.00002
-
(2011)
Front. Syst. Neurosci
, vol.5
, pp. 2
-
-
Allen, E.A.1
Erhardt, E.B.2
Damaraju, E.3
Gruner, W.4
Segall, J.M.5
Silva, R.F.6
-
2
-
-
84898713756
-
Classification of schizophrenia patients based on resting-state functional network connectivity
-
doi: 10.3389/fnins.2013.00133
-
Arbabshirani, M. R., Kiehl, K., Pearlson, G., and Calhoun, V. D. (2013). Classification of schizophrenia patients based on resting-state functional network connectivity. Front. Neurosci. 7:133. doi: 10.3389/fnins.2013.00133
-
(2013)
Front. Neurosci
, vol.7
, pp. 133
-
-
Arbabshirani, M.R.1
Kiehl, K.2
Pearlson, G.3
Calhoun, V.D.4
-
3
-
-
84855951128
-
Analysis of multimodal neuroimaging data
-
doi: 10.1109/RBME.2011.2170675
-
Bießmann, F., Plis, S., Meinecke, F. C., Eichele, T., and Müller, K. R. (2011). Analysis of multimodal neuroimaging data. IEEE Rev. Biomed. Eng. 4, 6. doi: 10.1109/RBME.2011.2170675
-
(2011)
IEEE Rev. Biomed. Eng
, vol.4
, pp. 6
-
-
Bießmann, F.1
Plis, S.2
Meinecke, F.C.3
Eichele, T.4
Müller, K.R.5
-
4
-
-
84872318214
-
The spatiospectral characterization of brain networks: Fusing concurrent EEG spectra and fMRI maps
-
doi: 10.1016/j.neuroimage.2012.12.024
-
Bridwell, D. A., Wu, L., Eichele, T., and Calhoun, V. D. (2013). The spatiospectral characterization of brain networks: fusing concurrent EEG spectra and fMRI maps. Neuroimage 69, 101-111. doi: 10.1016/j.neuroimage.2012.12.024
-
(2013)
Neuroimage
, vol.69
, pp. 101-111
-
-
Bridwell, D.A.1
Wu, L.2
Eichele, T.3
Calhoun, V.D.4
-
5
-
-
33749566820
-
When random sampling preserves privacy
-
Lecture notes in computer science, ed C. Dwork (Berlin: Springer-Verlag), doi: 10.1007/11818175_12
-
Chaudhuri, K., and Mishra, N. (2006). "When random sampling preserves privacy," in Advances in Cryptology - CRYPTO 2006. Lecture notes in computer science, Vol. 4117, ed C. Dwork (Berlin: Springer-Verlag), 198-213. doi: 10.1007/11818175_12
-
(2006)
In Advances In Cryptology - CRYPTO 2006
, vol.4117
, pp. 198-213
-
-
Chaudhuri, K.1
Mishra, N.2
-
6
-
-
79955858775
-
Differentially private empirical risk minimization
-
Chaudhuri, K., Monteleoni, C., and Sarwate, A. D. (2011). Differentially private empirical risk minimization. J. Mach. Learn. Res. 12, 1069-1109.
-
(2011)
J. Mach. Learn. Res
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
7
-
-
84885593655
-
A near-optimal algorithm for differentially-private principal components
-
Chaudhuri, K., Sarwate, A. D., and Sinha, K. (2013). A near-optimal algorithm for differentially-private principal components. J. Mach. Learn. Res. 14, 2905-2943.
-
(2013)
J. Mach. Learn. Res
, vol.14
, pp. 2905-2943
-
-
Chaudhuri, K.1
Sarwate, A.D.2
Sinha, K.3
-
8
-
-
84880958277
-
Guided exploration of genomic risk for gray matter abnormalities in schizophrenia using parallel independent component analysis with reference
-
doi: 10.1016/j.neuroimage.2013. 05.073
-
Chen, J., Calhoun, V. D., Pearlson, G. D., Perrone-Bizzozero, N., Sui, J., Turner, J. A., et al. (2013). Guided exploration of genomic risk for gray matter abnormalities in schizophrenia using parallel independent component analysis with reference. Neuroimage 83, 384-396. doi: 10.1016/j.neuroimage.2013. 05.073
-
(2013)
Neuroimage
, vol.83
, pp. 384-396
-
-
Chen, J.1
Calhoun, V.D.2
Pearlson, G.D.3
Perrone-Bizzozero, N.4
Sui, J.5
Turner, J.A.6
-
9
-
-
51149088120
-
Genetic privacy. Whole-genome data not anonymous, challenging assumptions
-
doi: 10.1126/science.321.5894.1278
-
Couzin, J. (2008). Genetic privacy. Whole-genome data not anonymous, challenging assumptions. Science 321, 1728. doi: 10.1126/science.321.5894.1278
-
(2008)
Science
, vol.321
, pp. 1728
-
-
Couzin, J.1
-
10
-
-
84886410588
-
Identification of neural connectivity signatures of autism using machine learning
-
doi: 10.3389/fnhum.2013.00670
-
Deshpande, G., Libero, L., Sreenivasan, K. R., Deshpande, H., and Kana, R. K. (2013). Identification of neural connectivity signatures of autism using machine learning. Front. Hum. Neurosci. 7:670. doi: 10.3389/fnhum.2013.00670
-
(2013)
Front. Hum. Neurosci
, vol.7
, pp. 670
-
-
Deshpande, G.1
Libero, L.2
Sreenivasan, K.R.3
Deshpande, H.4
Kana, R.K.5
-
11
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY: ACM
-
Dinur, I., and Nissim, K. (2003). "Revealing information while preserving privacy," in Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (New York, NY: ACM), 202-210.
-
(2003)
In Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium On Principles of Database Systems
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
12
-
-
84877739294
-
Privacy aware learning
-
eds P. Bartlett, F. C. N. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation
-
Duchi, J., Jordan, M., and Wainwright, M. (2012). "Privacy aware learning," in Advances in Neural Information Processing Systems 25, eds P. Bartlett, F. C. N. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation), 1439-1447.
-
(2012)
In Advances In Neural Information Processing Systems 25
, pp. 1439-1447
-
-
Duchi, J.1
Jordan, M.2
Wainwright, M.3
-
13
-
-
84898735280
-
Local privacy and minimax bounds: Sharp rates for probability estimation
-
Duchi, J., Wainwright, M. J., and Jordan, M. (2013). Local privacy and minimax bounds: sharp rates for probability estimation. Adv. Neural Inform. Process. Syst. 26, 1529-1537.
-
(2013)
Adv. Neural Inform. Process. Syst
, vol.26
, pp. 1529-1537
-
-
Duchi, J.1
Wainwright, M.J.2
Jordan, M.3
-
14
-
-
70350682013
-
Differential privacy and robust statistics
-
New York, NY: ACM, doi: 10.1145/1536414. 1536466
-
Dwork, C, and Lei, J. (2009). "Differential privacy and robust statistics," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC'09) (New York, NY: ACM), 371-380. doi: 10.1145/1536414. 1536466
-
(2009)
In Proceedings of the 41st Annual ACM Symposium On Theory of Computing (STOC'09)
, pp. 371-380
-
-
Dwork, C.1
Lei, J.2
-
15
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
eds S. Halevi and T. Rabin (Berlin, Heidelberg: Springer
-
Dwork, C, McSherry, F., Nissim, K., and Smith, A. (2006). "Calibrating noise to sensitivity in private data analysis," in Theory of Cryptography. Lecture notes in computer science, Vol. 3876, eds S. Halevi and T. Rabin (Berlin, Heidelberg: Springer), 265-284.
-
(2006)
In Theory of Cryptography. Lecture Notes In Computer Science
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
78751522594
-
Boosting and differential privacy
-
Las Vegas, NV
-
Dwork, C, Rothblum, G., and Vadhan, S. (2010). "Boosting and differential privacy," in 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS '10) (Las Vegas, NV), 51-60.
-
(2010)
In 51st Annual IEEE Symposium On Foundations of Computer Science (FOCS '10)
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.2
Vadhan, S.3
-
17
-
-
77957582791
-
Differential privacy for statistics: What we know and what we want to learn
-
Dwork, C, and Smith, A. (2009). Differential privacy for statistics: what we know and what we want to learn. J. Privacy Confident. 1, 135-154.
-
(2009)
J. Privacy Confident
, vol.1
, pp. 135-154
-
-
Dwork, C.1
Smith, A.2
-
18
-
-
84871058287
-
Real-time aggregate monitoring with differential privacy
-
New York, NY: ACM
-
Fan, L., and Xiong, L. (2012). "Real-time aggregate monitoring with differential privacy," in Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM'12) (New York, NY: ACM), 2169-2173.
-
(2012)
In Proceedings of the 21st ACM International Conference On Information and Knowledge Management (CIKM'12)
, pp. 2169-2173
-
-
Fan, L.1
Xiong, L.2
-
19
-
-
41649120246
-
Feasibility of multi-site clinical structural neuroimaging studies of aging using legacy data
-
doi: 10.1007/s12021-007-9003-9
-
Fennema-Notestine, C, Gamst, A. C, Quinn, B. T., Pacheco, J., Jernigan, T. L., Thal, L., et al. (2007). Feasibility of multi-site clinical structural neuroimaging studies of aging using legacy data. Neuroinformatics 5, 235-245. doi: 10.1007/s12021-007-9003-9
-
(2007)
Neuroinformatics
, vol.5
, pp. 235-245
-
-
Fennema-Notestine, C.1
Gamst, A.C.2
Quinn, B.T.3
Pacheco, J.4
Jernigan, T.L.5
Thal, L.6
-
20
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
doi: 10.1201/9781420091502, 14:1-14:53
-
Fung, B. C. M., Wang, K., Chen, R., and Yu, P. S. (2010). Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. 42, 14:1-14:53. doi: 10.1201/9781420091502
-
(2010)
ACM Comput. Surv
, vol.42
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
21
-
-
0002211517
-
A dual algorithm for the solution of nonlinear variational problems via finite element approximation
-
doi: 10.1016/0898-1221(76)90003-1
-
Gabay, D., and Mercier, B. (1976). A dual algorithm for the solution of nonlinear variational problems via finite element approximation. Comput. Math. Appl. 2, 17-40. doi: 10.1016/0898-1221(76)90003-1
-
(1976)
Comput. Math. Appl
, vol.2
, pp. 17-40
-
-
Gabay, D.1
Mercier, B.2
-
22
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
New York, NY: ACM, doi: 10.1145/1401890. 1401926
-
Ganta, S. R., Kasiviswanathan, S. P., and Smith, A. (2008). "Composition attacks and auxiliary information in data privacy," in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'08) (New York, NY: ACM), 265-273. doi: 10.1145/1401890. 1401926
-
(2008)
In Proceedings of the 14th ACM SIGKDD International Conference On Knowledge Discovery and Data Mining (KDD'08)
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
23
-
-
84898715390
-
The Optimal Mechanism in Differential Privacy
-
Geng, Q., and Viswanath, P. (2012). The Optimal Mechanism in Differential Privacy. Technical Report arXiv:1212.1186.
-
(2012)
Technical Report ArXiv
, vol.1212
, pp. 1186
-
-
Geng, Q.1
Viswanath, P.2
-
24
-
-
84898715390
-
The Optimal Mechanism in (e, δ)-Differential Privacy
-
Geng, Q., and Viswanath, P. (2013). The Optimal Mechanism in (e, δ)-Differential Privacy. Technical Report arXiv:1305.1330.
-
(2013)
Technical Report ArXiv
, vol.1305
, pp. 1330
-
-
Geng, Q.1
Viswanath, P.2
-
25
-
-
79959622530
-
Selling privacy at auction
-
New York, NY: ACM
-
Ghosh, A., and Roth, A. (2011). "Selling privacy at auction," in Proceeding of the 12th ACM Conference on Electronic Commerce (EC'11) (New York, NY: ACM), 199-208.
-
(2011)
In Proceeding of the 12th ACM Conference On Electronic Commerce (EC'11)
, pp. 199-208
-
-
Ghosh, A.1
Roth, A.2
-
26
-
-
84871605204
-
Univerally utility-maximizing privacy mechanisms
-
doi: 10.1137/09076828X
-
Ghosh, A., Roughgarden, T., and Sundararajan, M. (2012). Univerally utility-maximizing privacy mechanisms. SIAM J. Comput. 41, 1673-1693. doi: 10.1137/09076828X
-
(2012)
SIAM J. Comput
, vol.41
, pp. 1673-1693
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
27
-
-
84873731200
-
Refinement and discovery of new hotspots of copy-number variation associated with autism spectrum disorder
-
doi: 10.1016/j.ajhg.2012.12.016
-
Girirajan, S., Dennis, M. Y, Baker, C, Malig, M., Coe, B. P., Campbell, C. D., et al. (2013). Refinement and discovery of new hotspots of copy-number variation associated with autism spectrum disorder. Am. J. Hum. Genet. 92, 221-237. doi: 10.1016/j.ajhg.2012.12.016
-
(2013)
Am. J. Hum. Genet
, vol.92
, pp. 221-237
-
-
Girirajan, S.1
Dennis, M.Y.2
Baker, C.3
Malig, M.4
Coe, B.P.5
Campbell, C.D.6
-
28
-
-
77954735969
-
Universally optimal privacy mechanisms for minimax agents
-
New York, NY: ACM
-
Gupte, M., and Sundararajan, M. (2010). "Universally optimal privacy mechanisms for minimax agents," in ACM SIGMOD Symposium on Principles of Database Systems (PODS) (New York, NY: ACM), 135-146.
-
(2010)
In ACM SIGMOD Symposium On Principles of Database Systems (PODS)
, pp. 135-146
-
-
Gupte, M.1
Sundararajan, M.2
-
29
-
-
84872459720
-
Identifying personal genomes by surname inference
-
doi: 10.1126/science.1229566
-
Gymrek, M., McGuire, A. L., Folan, D., Halperin, E., and Erlich, Y. (2013). Identifying personal genomes by surname inference. Science 339, 321-324. doi: 10.1126/science.1229566
-
(2013)
Science
, vol.339
, pp. 321-324
-
-
Gymrek, M.1
McGuire, A.L.2
Folan, D.3
Halperin, E.4
Erlich, Y.5
-
30
-
-
85076486849
-
Differential privacy under fire
-
Berkeley, CA: USENIX Association)
-
Haeberlen, A., Pierce, B. C, and Narayan, A. (2011). "Differential privacy under fire," in Proceedings of the 20th USENIX Conference on Security (Berkeley, CA: USENIX Association).
-
(2011)
In Proceedings of the 20th USENIX Conference On Security
-
-
Haeberlen, A.1
Pierce, B.C.2
Narayan, A.3
-
31
-
-
84875600987
-
A simple and practical algorithm for differentially private data release
-
Eds P. Bartlett, F. Pereira, C. Burges, L. Bottou and K. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation)
-
Hardt, M., Ligett, K., and McSherry, F. (2012). "A simple and practical algorithm for differentially private data release," in Advances in Neural Information Processing Systems, VOl. 25, eds P. Bartlett, F. Pereira, C. Burges, L. Bottou and K. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation), 2348-2356.
-
(2012)
In Advances In Neural Information Processing Systems
, vol.25
, pp. 2348-2356
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
32
-
-
84862594279
-
Beating randomized response on incoherent matrices
-
New York, NY: ACM
-
Hardt, M., and Roth, A. (2012). "Beating randomized response on incoherent matrices," in Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC'12) (New York, NY: ACM), 1255-1268.
-
(2012)
In Proceedings of the 44th Annual ACM Symposium On Theory of Computing (STOC'12)
, pp. 1255-1268
-
-
Hardt, M.1
Roth, A.2
-
33
-
-
84879816605
-
Beyond worst-case analysis in private singular vector computation
-
New York, NY: ACM, doi: 10.1145/2488608.2488650
-
Hardt, M., and Roth, A. (2013). "Beyond worst-case analysis in private singular vector computation," in Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC'13) (New York, NY: ACM), 331-340. doi: 10.1145/2488608.2488650
-
(2013)
In Proceedings of the 45th Annual ACM Symposium On Theory of Computing (STOC'13)
, pp. 331-340
-
-
Hardt, M.1
Roth, A.2
-
34
-
-
84898730713
-
-
Enigma Consortium, in 19th Annual Meeting of the Organization for Human Brain Mapping (Seattle, WA)
-
Hilbar, D., Calhoun, V, and Enigma Consortium (2013). "ENIGMA2: genome-wide scans of subcortical brain volumes in 16,125 subjects from 28 cohorts worldwide," in 19th Annual Meeting of the Organization for Human Brain Mapping (Seattle, WA).
-
(2013)
ENIGMA2: Genome-wide Scans of Subcortical Brain Volumes In 16,125 Subjects From 28 Cohorts Worldwide
-
-
Hilbar, D.1
Calhoun, V.2
-
35
-
-
0013344078
-
Training products of experts by minimizing contrastive divergence
-
2002. doi: 10.1162/089976602760128018
-
Hinton, G. (2000). Training products of experts by minimizing contrastive divergence. Neural Comput. 14, 2002. doi: 10.1162/089976602760128018
-
(2000)
Neural Comput
, pp. 14
-
-
Hinton, G.1
-
36
-
-
33745805403
-
A fast learning algorithm for deep belief nets
-
doi: 10.1162/neco.2006.18.7.1527
-
Hinton, G. E., Osindero, S., and Teh, YW. (2006). A fast learning algorithm for deep belief nets. Neural Comput. 18, 1527-1554. doi: 10.1162/neco.2006.18.7.1527
-
(2006)
Neural Comput
, vol.18
, pp. 1527-1554
-
-
Hinton, G.E.1
Osindero, S.2
Teh, Y.W.3
-
37
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density snp genotyping microarrays
-
doi: 10.1371/journal.pgen.1000167
-
Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., et al. (2008). Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genet. 4:e1000167. doi: 10.1371/journal.pgen.1000167
-
(2008)
PLoS Genet
, vol.4
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
-
38
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
NDSS 2011
-
Huang, Y, Malka, L., Evans, D., and Katz, J. (2011). "Efficient privacy-preserving biometric identification," in Proceedings of the 18th Network and Distributed System Security Conference (NDSS 2011).
-
(2011)
In Proceedings of the 18th Network and Distributed System Security Conference
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
39
-
-
41949137974
-
The Alzheimer's disease neuroimaging initiative (ADNI): MRI methods
-
doi: 10.1002/jmri.21049
-
Jack, C. R., Bernstein, M. A., Fox, N. C, Thompson, P., Alexander, G., Harvey, D., et al. (2008). The Alzheimer's disease neuroimaging initiative (ADNI): MRI methods.J. Magn. Reson. Imaging 27, 685-691. doi: 10.1002/jmri.21049
-
(2008)
J. Magn. Reson. Imaging
, vol.27
, pp. 685-691
-
-
Jack, C.R.1
Bernstein, M.A.2
Fox, N.C.3
Thompson, P.4
Alexander, G.5
Harvey, D.6
-
40
-
-
84887484789
-
Differentially private online learning
-
JMLR workshop and conference proceedings, Scotland: Edinburgh, 24.1-24.34
-
Jain, P., Kothari, P., and Thakurta, A. (2012). "Differentially private online learning," in Proceedings of the 25th Annual Conference on Learning Theory (COLT'12). JMLR workshop and conference proceedings, Vol. 23 (Scotland: Edinburgh), 24.1-24.34.
-
(2012)
In Proceedings of the 25th Annual Conference On Learning Theory (COLT'12)
, vol.23
-
-
Jain, P.1
Kothari, P.2
Thakurta, A.3
-
41
-
-
84897528689
-
Differentially private learning with kernels
-
JMLR: workshop and conference proceedings, eds S. Dasgupta and D. McAllester (Beijing: International Machine Learning Society
-
Jain, P., and Thakurta, A. (2013). "Differentially private learning with kernels," in Proceedings of The 30th International Conference on Machine Learning (ICML). JMLR: workshop and conference proceedings, Vol. 28, eds S. Dasgupta and D. McAllester (Beijing: International Machine Learning Society), 118-126.
-
(2013)
In Proceedings of the 30th International Conference On Machine Learning (ICML)
, vol.28
, pp. 118-126
-
-
Jain, P.1
Thakurta, A.2
-
43
-
-
84879881221
-
Privacy technology to share data for comparative effectiveness research: A systematic review
-
doi: 10.1097/MLR.0b013e31829b1d10
-
Jiang, X., Sarwate, A. D., and Ohno-Machado, L. (2013). Privacy technology to share data for comparative effectiveness research: a systematic review. Med. Care 51, S58-S65. doi: 10.1097/MLR.0b013e31829b1d10
-
(2013)
Med. Care
, vol.51
-
-
Jiang, X.1
Sarwate, A.D.2
Ohno-Machado, L.3
-
44
-
-
84863487270
-
Private analysis of graph structure
-
Karwa, V, Raskhodnikova, S., Smith, A., and Yaroslavtsev, G. (2011). Private analysis of graph structure. Proc. VLDB Endowment 4, 1146-1157.
-
(2011)
Proc. VLDB Endowment
, vol.4
, pp. 1146-1157
-
-
Karwa, V.1
Raskhodnikova, S.2
Smith, A.3
Yaroslavtsev, G.4
-
46
-
-
79959983519
-
No free lunch in data privacy
-
New York, NY: ACM, doi: 10.1145/1989323.1989345
-
Kifer, D., and Machanavajjhala, A. (2011). "No free lunch in data privacy," in Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data (New York, NY: ACM), 193-204. doi: 10.1145/1989323.1989345
-
(2011)
In Proceedings of the 2011 ACM SIGMOD International Conference On Management of Data
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
47
-
-
84893149822
-
Private convex empirical risk minimization and high-dimensional regression
-
JMLR Workshop and Conference Proceedings, eds S. Mannor, N. Srebro and R. C. Williamson (Scotland: Edinburgh, 25.1-25.40
-
Kifer, D., Smith, A., and Thakurta, A. (2012). "Private convex empirical risk minimization and high-dimensional regression," in Proceedings of the 25th Annual Conference on Learning Theory (COLT'12). JMLR Workshop and Conference Proceedings, Vol. 23, eds S. Mannor, N. Srebro and R. C. Williamson (Scotland: Edinburgh), 25.1-25.40.
-
(2012)
In Proceedings of the 25th Annual Conference On Learning Theory (COLT'12)
, vol.23
-
-
Kifer, D.1
Smith, A.2
Thakurta, A.3
-
48
-
-
85162408461
-
Differentially private M-estimators
-
eds J. Shawe-Taylor, R. S. Zemel, P. Bartlett, F. Pereira and K. Q. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation
-
Lei, J. (2011). "Differentially private M-estimators," in Advances in Neural Information Processing Systems 24, eds J. Shawe-Taylor, R. S. Zemel, P. Bartlett, F. Pereira and K. Q. Weinberger (La Jolla, CA: Neural Information Processing Systems Foundation), 361-369.
-
(2011)
In Advances In Neural Information Processing Systems 24
, pp. 361-369
-
-
Lei, J.1
-
49
-
-
84874276742
-
Differentially private filtering
-
Maui, HI
-
Le Ny, J., and Pappas, G. J. (2012a). "Differentially private filtering," in Proceedings of the 51st Conference on Decision and Control (CDC) (Maui, HI), 3398-3403.
-
(2012)
In Proceedings of the 51st Conference On Decision and Control (CDC)
, pp. 3398-3403
-
-
Le Ny, J.1
Pappas, G.J.2
-
50
-
-
84875719669
-
Differentially private Kalman filtering
-
Monticello, IL
-
Le Ny, J., and Pappas, G. J. (2012b). "Differentially private Kalman filtering," in Proceedings of the 50th Annual Allerton Conference on Communications, Control and Computing (Monticello, IL), 1618-1625.
-
(2012)
In Proceedings of the 50th Annual Allerton Conference On Communications, Control and Computing
, pp. 1618-1625
-
-
Le Ny, J.1
Pappas, G.J.2
-
51
-
-
78049357399
-
Secure multiparty computation for privacy-reserving data mining
-
Lindell, Y, and Pinkas, B. (2009). Secure multiparty computation for privacy-reserving data mining. J. Priv. Confident. 1,59-98.
-
(2009)
J. Priv. Confident
, vol.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
52
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and ^-diversity
-
Istanbul
-
Li, N., Li, T., and Venkatasubramanian, S. (2007). "t-closeness: privacy beyond k-anonymity and ^-diversity," in IEEE 23rd International Conference on Data Engineering (ICDE) (Istanbul), 106-115.
-
(2007)
In IEEE 23rd International Conference On Data Engineering (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
53
-
-
84933672431
-
An ica with reference approach in identification of genetic variation and associated brain networks
-
doi: 10.3389/fnhum.2012.00021
-
Liu, J., Ghassemi, M. M., Michael, A. M., Boutte, D., Wells, W., Perrone-Bizzozero, N., et al. (2012). An ica with reference approach in identification of genetic variation and associated brain networks. Front. Hum. Neurosci. 6:21. doi: 10.3389/fnhum.2012.00021
-
(2012)
Front. Hum. Neurosci
, vol.6
, pp. 21
-
-
Liu, J.1
Ghassemi, M.M.2
Michael, A.M.3
Boutte, D.4
Wells, W.5
Perrone-Bizzozero, N.6
-
54
-
-
77958007735
-
Stride-an integrated standards-based translational research informatics platform
-
San Francisco, CA
-
Lowe, H. J., Ferris, T. A., Hernandez, P. M., and Weber, S. C. (2009). "Stride-an integrated standards-based translational research informatics platform," in Proceedings of the 2009 AMIA Annual Symposium (San Francisco, CA), 391-395.
-
(2009)
In Proceedings of the 2009 AMIA Annual Symposium
, pp. 391-395
-
-
Lowe, H.J.1
Ferris, T.A.2
Hernandez, P.M.3
Weber, S.C.4
-
55
-
-
77956634832
-
Glad you asked: Participants' opinions of re-consent for dbGaP data submission
-
doi: 10.1525/jer.2010.5.3.9
-
Ludman, E. J., Fullerton, S. M., Spangler, L., Trinidad, S. B., Fujii, M. M., Jarvik, G. P., et al. (2010). Glad you asked: participants' opinions of re-consent for dbGaP data submission. J. Empir. Res. Hum. Res. Ethics 5, 9-16. doi: 10.1525/jer.2010.5.3.9
-
(2010)
J. Empir. Res. Hum. Res. Ethics
, vol.5
, pp. 9-16
-
-
Ludman, E.J.1
Fullerton, S.M.2
Spangler, L.3
Trinidad, S.B.4
Fujii, M.M.5
Jarvik, G.P.6
-
56
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
Cancun
-
Machanavajjhala, A., Kifer, D., Abowd, J. M., Gehrke, J., and Vilhuber, L. (2008). "Privacy: theory meets practice on the map," in IEEE 24th International Conference on Data Engineering (ICDE) (Cancun), 277-286.
-
(2008)
In IEEE 24th International Conference On Data Engineering (ICDE)
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
57
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
doi: 10.1145/1217299.1217302
-
Machanavajjhala, A., Kifer, D., Gehrke, J., and Venkitasubramaniam, M. (2007). L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1, 3. doi: 10.1145/1217299.1217302
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
58
-
-
36049037582
-
K-unlinkability: A privacy protection model for distributed data
-
doi: 10.1016/j.datak.2007.06.016
-
Malin, B. (2008). K-unlinkability: a privacy protection model for distributed data. Data Knowl. Eng. 64, 294-311. doi: 10.1016/j.datak.2007.06.016
-
(2008)
Data Knowl. Eng
, vol.64
, pp. 294-311
-
-
Malin, B.1
-
59
-
-
79959882088
-
Ethical and practical challenges of sharing data from genome-wide association studies: The eMERGE consortium experience
-
doi: 10.1101/gr.120329.111
-
McGuire, A. L., Basford, M., Dressler, L. G., Fullerton, S. M., Koenig, B. A., Li, R., et al. (2011). Ethical and practical challenges of sharing data from genome-wide association studies: the eMERGE consortium experience. Genome Res. 21, 1001-1007. doi: 10.1101/gr.120329.111
-
(2011)
Genome Res
, vol.21
, pp. 1001-1007
-
-
McGuire, A.L.1
Basford, M.2
Dressler, L.G.3
Fullerton, S.M.4
Koenig, B.A.5
Li, R.6
-
60
-
-
77956293777
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
doi: 10.1145/1810891.1810916
-
McSherry, F. (2010). Privacy integrated queries: an extensible platform for privacy-preserving data analysis. Commun. ACM 53, 89-97. doi: 10.1145/1810891.1810916
-
(2010)
Commun. ACM
, vol.53
, pp. 89-97
-
-
McSherry, F.1
-
62
-
-
43049109076
-
A large scale (n= 400) investigation of gray matter differences in schizophrenia using optimized voxel-based morphometry
-
doi: 10.1016/j.schres.2008.02.007
-
Meda, S. A., Giuliani, N. R., Calhoun, V. D., Jagannathan, K., Schretlen, D. J., Pulver, A., et al. (2008). A large scale (n= 400) investigation of gray matter differences in schizophrenia using optimized voxel-based morphometry. Schizophr. Res. 101, 95-105. doi: 10.1016/j.schres.2008.02.007
-
(2008)
Schizophr. Res
, vol.101
, pp. 95-105
-
-
Meda, S.A.1
Giuliani, N.R.2
Calhoun, V.D.3
Jagannathan, K.4
Schretlen, D.J.5
Pulver, A.6
-
63
-
-
84883448855
-
Making data sharing work: The fcp/indi experience
-
doi: 10.1016/j.neuroimage.2012.10.064
-
Mennes, M., Biswal, B. B., Castellanos, F. X., and Milham, M. P. (2013). Making data sharing work: the fcp/indi experience. Neuroimage 82, 683-691. doi: 10.1016/j.neuroimage.2012.10.064
-
(2013)
Neuroimage
, vol.82
, pp. 683-691
-
-
Mennes, M.1
Biswal, B.B.2
Castellanos, F.X.3
Milham, M.P.4
-
64
-
-
84862658503
-
GUPT: Privacy preserving data analysis made easy
-
New York, NY: ACM, doi: 10.1145/2213836.2213876
-
Mohan, P., Thakurta, A., Shi, E., Song, D., and Culler, D. (2012). "GUPT: privacy preserving data analysis made easy," in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data (New York, NY: ACM), 349-360. doi: 10.1145/2213836.2213876
-
(2012)
In Proceedings of the 2012 ACM SIGMOD International Conference On Management of Data
, pp. 349-360
-
-
Mohan, P.1
Thakurta, A.2
Shi, E.3
Song, D.4
Culler, D.5
-
65
-
-
0036363092
-
-
in AMIA, Fall Symposium 2002
-
Murphy, S. N., and Chueh, H. (2002). "A security architecture for query tools used to access large biomedical databases," in AMIA, Fall Symposium 2002, 552-556.
-
(2002)
A Security Architecture For Query Tools Used to Access Large Biomedical Databases
, pp. 552-556
-
-
Murphy, S.N.1
Chueh, H.2
-
66
-
-
34748833432
-
Integration of clinical and genetic data in the i2b2 architecture
-
Washington, DC
-
Murphy, S. N., Mendis, M. E., Berkowitz, D. A., Kohane, I., and Chueh, H. C. (2006). "Integration of clinical and genetic data in the i2b2 architecture," in Proceedings of the 2006 AMIA Annual Symposium (Washington, DC), 1040.
-
(2006)
In Proceedings of the 2006 AMIA Annual Symposium
, pp. 1040
-
-
Murphy, S.N.1
Mendis, M.E.2
Berkowitz, D.A.3
Kohane, I.4
Chueh, H.C.5
-
67
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Oakland, CA, doi: 10.1109/SP.2008.33
-
Narayanan, A., and Shmatikov, V. (2008). "Robust de-anonymization of large sparse datasets," in Proceedings of the 2008 IEEE Symposium on Security and Privacy (Oakland, CA), 111-125. doi: 10.1109/SP.2008.33
-
(2008)
In Proceedings of the 2008 IEEE Symposium On Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
69
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
San Francisco, CA
-
Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., and Taft, N. (2013). "Privacy-preserving ridge regression on hundreds of millions of records," in IEEE Symposium on Security and Privacy (San Francisco, CA), 334-348.
-
(2013)
In IEEE Symposium On Security and Privacy
, pp. 334-348
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
71
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
New York, NY: ACM, doi: 10.1145/1250790.1250803
-
Nissim, K., Raskhodnikova, S., and Smith, A. (2007). "Smooth sensitivity and sampling in private data analysis," in Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing (STOC'07) (New York, NY: ACM), 75-84. doi: 10.1145/1250790.1250803
-
(2007)
In Proceedings of the Thirty-Ninth Annual ACM Symposium On Theory of Computing (STOC'07)
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
72
-
-
84898729104
-
The composition theorem for differential privacy
-
Oh, S., and Viswanath, P. (2013). The composition theorem for differential privacy. Technical Report arXiv:1311.0776.
-
(2013)
Technical Report ArXiv
, vol.1311
, pp. 0776
-
-
Oh, S.1
Viswanath, P.2
-
73
-
-
84855185103
-
MEG and fMRI fusion for nonlinear estimation of neural and BOLD signal changes
-
doi: 10.3389/fninf.2010.00114
-
Plis, S. M., Calhoun, V. D., Eichele, T., Weisend, M. P., and Lane, T. (2010). MEG and fMRI fusion for nonlinear estimation of neural and BOLD signal changes. Front. Neuroinform. 4:12. doi: 10.3389/fninf.2010.00114
-
(2010)
Front. Neuroinform
, vol.4
, pp. 12
-
-
Plis, S.M.1
Calhoun, V.D.2
Eichele, T.3
Weisend, M.P.4
Lane, T.5
-
74
-
-
84886752096
-
Toward open sharing of task-based fMRI data: The OpenfMRI project
-
doi: 10.3389/fninf.2013.00012
-
Poldrack, R. A., Barch, D. M., Mitchell, J. P., Wager, T. D., Wagner, A. D., Devlin, J. T., et al. (2013). Toward open sharing of task-based fMRI data: the OpenfMRI project. Front. Neuroinform. 7:12. doi: 10.3389/fninf.2013.00012
-
(2013)
Front. Neuroinform
, vol.7
, pp. 12
-
-
Poldrack, R.A.1
Barch, D.M.2
Mitchell, J.P.3
Wager, T.D.4
Wagner, A.D.5
Devlin, J.T.6
-
75
-
-
84859783216
-
Data sharing in neuroimaging research
-
doi: 10.3389/fninf.2012.00009
-
Poline, J.-B., Breeze, J. L., Ghosh, S., Gorgolewski, K., Halchenko, Y. O., Hanke, M., et al. (2012). Data sharing in neuroimaging research. Front. Neuroinform. 6:9. doi: 10.3389/fninf.2012.00009
-
(2012)
Front. Neuroinform
, vol.6
, pp. 9
-
-
Poline, J.-B.1
Breeze, J.L.2
Ghosh, S.3
Gorgolewski, K.4
Halchenko, Y.O.5
Hanke, M.6
-
76
-
-
57749175531
-
Widespread cortical dysfunction in schizophrenia: The FBIRN imaging consortium
-
doi: 10.1093/schbul/sbn159
-
Potkin, S. G., and Ford, J. M. (2009). Widespread cortical dysfunction in schizophrenia: the FBIRN imaging consortium. Schizophr. Bull. 35, 15-18. doi: 10.1093/schbul/sbn159
-
(2009)
Schizophr. Bull
, vol.35
, pp. 15-18
-
-
Potkin, S.G.1
Ford, J.M.2
-
77
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
New York, NY: ACM, doi: 10.1145/1559795.15 59812
-
Rastogi, V., Hay, M., Miklau, G., and Suciu, D. (2009). "Relationship privacy: output perturbation for queries with joins," in Proceedings of the Twenty-Eighth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS'09) (New York, NY: ACM), 107-116. doi: 10.1145/1559795.15 59812
-
(2009)
In Proceedings of the Twenty-Eighth ACM SIGMOD-SIGACT-SIGART Symposium On Principles of Database Systems (PODS'09)
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
79
-
-
84885020424
-
Genome-wide association analysis identifies 13 new risk loci for schizophrenia
-
doi: 10.1038/ng.2742
-
Ripke, S., O'Dushlaine, C., Chambert, K., Moran, J. L., Kahler, A. K., Akterin, S., et al. (2013). Genome-wide association analysis identifies 13 new risk loci for schizophrenia. Nat. Genet. 45, 1150-1159. doi: 10.1038/ng.2742
-
(2013)
Nat. Genet
, vol.45
, pp. 1150-1159
-
-
Ripke, S.1
O'Dushlaine, C.2
Chambert, K.3
Moran, J.L.4
Kahler, A.K.5
Akterin, S.6
-
80
-
-
85015649873
-
Airavat: Security and privacy for MapReduce
-
Berkeley, CA: USENIX Association)
-
Roy, I., Setty, S. T. V., Kilzer, A., Shmatikov, V., and Witchel, E. (2010). "Airavat: security and privacy for MapReduce," in Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation (NSDI'10) (Berkeley, CA: USENIX Association).
-
(2010)
In Proceedings of the 7th USENIX Conference On Networked Systems Design and Implementation (NSDI'10)
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
81
-
-
84877781092
-
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
-
Rubinstein, B. I. P., Bartlett, P. L., Huang, L., and Taft, N. (2012). Learning in a large function space: privacy-preserving mechanisms for SVM learning. J. Priv. Confident. 4, 65-100.
-
(2012)
J. Priv. Confident
, vol.4
, pp. 65-100
-
-
Rubinstein, B.I.P.1
Bartlett, P.L.2
Huang, L.3
Taft, N.4
-
82
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Lecture notes in computer science, eds D. Lee and S. Hong (Berlin: Springer), doi: 10.1007/978-3-642-14423-3_16
-
Sadeghi, A.-R., Schneider, T., and Wehrenberg, I. (2010). "Efficient privacy-preserving face recognition," in Information, Security and Cryptology - ICISC 2009. Lecture notes in computer science, Vol. 5984, eds D. Lee and S. Hong (Berlin: Springer), 229-244. doi: 10.1007/978-3-642-14423-3_16
-
(2010)
In Information, Security and Cryptology - ICISC 2009
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
83
-
-
85032751978
-
Signal processing and machine learning with differential privacy: Theory, algorithms, and challenges
-
doi: 10.1109/MSP.2013.2259911
-
Sarwate, A. D., and Chaudhuri, K. (2013). Signal processing and machine learning with differential privacy: theory, algorithms, and challenges. IEEE Signal Process. Mag. 30, 86-94. doi: 10.1109/MSP.2013.2259911
-
(2013)
IEEE Signal Process. Mag
, vol.30
, pp. 86-94
-
-
Sarwate, A.D.1
Chaudhuri, K.2
-
84
-
-
84860329478
-
Bayesian method to predict individual SNP genotypes from gene expression data
-
doi: 10.1038/ng.2248
-
Schadt, E. E., Woo, S., and Hao, K. (2012). Bayesian method to predict individual SNP genotypes from gene expression data. Nat. Genet. 44, 603-608. doi: 10.1038/ng.2248
-
(2012)
Nat. Genet
, vol.44
, pp. 603-608
-
-
Schadt, E.E.1
Woo, S.2
Hao, K.3
-
85
-
-
84888083675
-
Multisensory integration of dynamic emotional faces and voices: Method for simultaneous EEG-fMRI measurements
-
doi: 10.3389/fnhum.2013.00729
-
Schelenz, P. D., Klasen, M., Reese, B., Regenbogen, C., Wolf, D., Kato, Y., et al. (2013). Multisensory integration of dynamic emotional faces and voices: method for simultaneous EEG-fMRI measurements. Front. Hum. Neurosci. 7:729. doi: 10.3389/fnhum.2013.00729
-
(2013)
Front. Hum. Neurosci
, vol.7
, pp. 729
-
-
Schelenz, P.D.1
Klasen, M.2
Reese, B.3
Regenbogen, C.4
Wolf, D.5
Kato, Y.6
-
87
-
-
84937945584
-
Differentially private feature selection via stability arguments, and the robustness of LASSO
-
JMLR: workshop and conference proceedings
-
Smith, A., and Thakurta, A. (2013). "Differentially private feature selection via stability arguments, and the robustness of LASSO," in Conference on Learning Theory. JMLR: workshop and conference proceedings, Vol. 30, 1-32.
-
(2013)
In Conference On Learning Theory
, vol.30
, pp. 1-32
-
-
Smith, A.1
Thakurta, A.2
-
88
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
doi: 10.1111/j.1748-720X.1997.tb 01885.x
-
Sweeney, L. (1997). Weaving technology and policy together to maintain confidentiality. J. Law Med. Ethics 25, 98-110. doi: 10.1111/j.1748-720X.1997.tb 01885.x
-
(1997)
J. Law Med. Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
89
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
doi: 10.1142/S0218488502001648
-
Sweeney, L. (2002). K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10, 557-570. doi: 10.1142/S0218488502001648
-
(2002)
Int. J. Uncertain. Fuzz. Knowl. Based Syst
, vol.10
, pp. 557-570
-
-
Sweeney, L.1
-
90
-
-
84898996940
-
Optimal algorithms for private online learning in full-information and bandit settings
-
eds C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Weinberger
-
Thakurta, A. G., and Smith, A. (2013). "(Nearly) optimal algorithms for private online learning in full-information and bandit settings," in Advances in Neural Information Processing Systems 26, eds C. Burges, L. Bottou, M. Welling, Z. Ghahramani, and K. Weinberger, 2733-2741.
-
(2013)
In Advances In Neural Information Processing Systems 26
, pp. 2733-2741
-
-
Thakurta, A.G.1
Smith, A.2
-
91
-
-
84886749866
-
Electronic data capture, representation, and applications for neuroimaging
-
doi: 10.3389/fninf.2012.00016
-
Turner, J. A., and Van Horn, J. D. (2012). Electronic data capture, representation, and applications for neuroimaging. Front. Neuroinform. 6:16. doi: 10.3389/fninf.2012.00016
-
(2012)
Front. Neuroinform
, vol.6
, pp. 16
-
-
Turner, J.A.1
van Horn, J.D.2
-
92
-
-
84893800406
-
Schizophrenia miR-137 locus risk genotype is associated with dor-solateral prefrontal cortex hyperactivation
-
doi: 10.1016/j.biopsych.2013.06.016
-
Van Erp, T. G., Guella, I., Vawter, M. P., Turner, J., Brown, G. G., McCarthy, G., et al. (2013). Schizophrenia miR-137 locus risk genotype is associated with dor-solateral prefrontal cortex hyperactivation. Biol. Psychiatry 75, 398-405. doi: 10.1016/j.biopsych.2013.06.016
-
(2013)
Biol. Psychiatry
, vol.75
, pp. 398-405
-
-
van Erp, T.G.1
Guella, I.2
Vawter, M.P.3
Turner, J.4
Brown, G.G.5
McCarthy, G.6
-
93
-
-
84872248095
-
Protecting count queries in study design
-
doi: 10.1136/amiajnl-2011-000459
-
Vinterbo, S. A., Sarwate, A. D., and Boxwala, A. (2012). Protecting count queries in study design. J. Am. Med. Inform. Assoc. 19, 750-757. doi: 10.1136/amiajnl-2011-000459
-
(2012)
J. Am. Med. Inform. Assoc
, vol.19
, pp. 750-757
-
-
Vinterbo, S.A.1
Sarwate, A.D.2
Boxwala, A.3
-
94
-
-
77952555772
-
A statistical framework for differential privacy
-
doi: 10.1198/jasa.2009.tm08651
-
Wasserman, L., and Zhou, S. (2010). A statistical framework for differential privacy. J. Am. Stat. Assoc. 105, 375-389. doi: 10.1198/jasa.2009.tm08651
-
(2010)
J. Am. Stat. Assoc
, vol.105
, pp. 375-389
-
-
Wasserman, L.1
Zhou, S.2
-
95
-
-
85161972679
-
Probabilistic inference and differential privacy
-
eds J. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, and A. Culotta
-
Williams, O., and McSherry, F. (2010). "Probabilistic inference and differential privacy," in Advances in Neural Information Processing Systems 23, eds J. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, and A. Culotta, 2451-2459.
-
(2010)
In Advances In Neural Information Processing Systems 23
, pp. 2451-2459
-
-
Williams, O.1
McSherry, F.2
-
96
-
-
78149243538
-
DataSHIELD: Resolving a conflict in contemporary bioscience - performing a pooled analysis of individual-level data without sharing the data
-
doi: 10.1093/ije/dyq111
-
Wolfson, M., Wallace, S., Masca, N., Rowe, G., Sheehan, N., Ferretti, V., et al. (2010). DataSHIELD: resolving a conflict in contemporary bioscience - performing a pooled analysis of individual-level data without sharing the data. Int. J. Epidemiol. 39, 1372-1382. doi: 10.1093/ije/dyq111
-
(2010)
Int. J. Epidemiol
, vol.39
, pp. 1372-1382
-
-
Wolfson, M.1
Wallace, S.2
Masca, N.3
Rowe, G.4
Sheehan, N.5
Ferretti, V.6
-
97
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
New York, NY: ACM, doi: 10.1145/1247480.1247556
-
Xiao, X., and Tao, Y. (2007). "m-invariance: towards privacy preserving re-publication of dynamic datasets," in Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data (New York, NY: ACM), 689-700. doi: 10.1145/1247480.1247556
-
(2007)
In Proceedings of the 2007 ACM SIGMOD International Conference On Management of Data
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
98
-
-
84899031306
-
Efficient distributed linear classification algorithms via the alternating direction method of multipliers
-
La Palma
-
Zhang, C., Lee, H., and Shin, K. G. (2012a). "Efficient distributed linear classification algorithms via the alternating direction method of multipliers," in International Conference on Artificial Intelligence and Statistics (La Palma), 1398-1406.
-
(2012)
In International Conference On Artificial Intelligence and Statistics
, pp. 1398-1406
-
-
Zhang, C.1
Lee, H.2
Shin, K.G.3
-
99
-
-
84873178476
-
Functional mechanism: Regression analysis under differential privacy
-
Zhang, J., Zhang, Z., Xiao, X., Yang, Y., and Winslett, M. (2012b). Functional mechanism: regression analysis under differential privacy. Proc. VLDB Endowment 5, 1364-1375.
-
(2012)
Proc. VLDB Endowment
, vol.5
, pp. 1364-1375
-
-
Zhang, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Winslett, M.5
|