-
1
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., and Talwar, K. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS (2007), pp. 273-282.
-
(2007)
PODS
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
2
-
-
77949617188
-
Bounds on the sample complexity for private learning and private data release
-
Beimel, A., Kasiviswanathan, S. P., and Nissim, K. Bounds on the sample complexity for private learning and private data release. In TCC (2010), pp. 437-454.
-
(2010)
TCC
, pp. 437-454
-
-
Beimel, A.1
Kasiviswanathan, S.P.2
Nissim, K.3
-
3
-
-
84873351478
-
Characterizing the sample complexity of private learners
-
Beimel, A., Nissim, K., and Stemmer, U. Characterizing the sample complexity of private learners. In ITCS (2013), pp. 97-110.
-
(2013)
ITCS
, pp. 97-110
-
-
Beimel, A.1
Nissim, K.2
Stemmer, U.3
-
4
-
-
84885226635
-
Private learning and sanitization: Pure vs approximate differential privacy
-
Beimel, A., Nissim, K., and Stemmer, U. Private learning and sanitization: Pure vs. approximate differential privacy. In APPROX-RANDOM (2013), pp. 363-378.
-
(2013)
Approx-Random
, pp. 363-378
-
-
Beimel, A.1
Nissim, K.2
Stemmer, U.3
-
5
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
Blum, A., Dwork, C., McSherry, F., and Nissim, K. Practical privacy: the SuLQ framework. In PODS (2005), pp. 128-138.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
6
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Blum, A., Ligett, K., and Roth, A. A learning theory approach to non-interactive database privacy. In STOC (2008), pp. 609-618.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
7
-
-
78650128867
-
Robust fingerprinting codes: A near optimal construction
-
Boneh, D., Kiayias, A., and Montgomery, H. W. Robust fingerprinting codes: a near optimal construction. In Digital Rights Management Workshop (2010), pp. 3-12.
-
(2010)
Digital Rights Management Workshop
, pp. 3-12
-
-
Boneh, D.1
Kiayias, A.2
Montgomery, H.W.3
-
9
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Boneh, D., and Shaw, J. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory 44, 5 (1998), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
10
-
-
84893223230
-
Faster private release of marginals on small databases
-
Chandrasekaran, K., Thaler, J., Ullman, J., and Wan, A. Faster private release of marginals on small databases. ITCS 2014 (to appear) (2014).
-
(2014)
ITCS 2014 (To Appear)
-
-
Chandrasekaran, K.1
Thaler, J.2
Ullman, J.3
Wan, A.4
-
11
-
-
84858307870
-
Lower bounds in differential privacy
-
De, A. Lower bounds in differential privacy. In TCC (2012), pp. 321-338.
-
(2012)
TCC
, pp. 321-338
-
-
De, A.1
-
12
-
-
1142275486
-
Revealing information while preserving privacy
-
Dinur, I., and Nissim, K. Revealing information while preserving privacy. In PODS (2003), pp. 202-210.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
13
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., and Naor, M. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT (2006), pp. 486-503.
-
(2006)
EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
14
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In TCC (2006), pp. 265-284.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
15
-
-
35449000081
-
The price of privacy and the limits of lp decoding
-
Dwork, C., McSherry, F., and Talwar, K. The price of privacy and the limits of lp decoding. In STOC (2007), pp. 85-94.
-
(2007)
STOC
, pp. 85-94
-
-
Dwork, C.1
McSherry, F.2
Talwar, K.3
-
16
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
Dwork, C., Naor, M., Reingold, O., Rothblum, G. N., and Vadhan, S. P. On the complexity of differentially private data release: efficient algorithms and hardness results. In STOC (2009), pp. 381-390.
-
(2009)
STOC
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.P.5
-
18
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Dwork, C., and Nissim, K. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO (2004), pp. 528-544.
-
(2004)
CRYPTO
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
19
-
-
78751522594
-
Boosting and differential privacy
-
Dwork, C., Rothblum, G. N., and Vadhan, S. P. Boosting and differential privacy. In FOCS (2010), pp. 51-60.
-
(2010)
FOCS
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.N.2
Vadhan, S.P.3
-
20
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
Dwork, C., and Yekhanin, S. New efficient attacks on statistical disclosure control mechanisms. In CRYPTO (2008), pp. 469-480.
-
(2008)
CRYPTO
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
21
-
-
79959740503
-
Privately releasing conjunctions and the statistical query barrier
-
Gupta, A., Hardt, M., Roth, A., and Ullman, J. Privately releasing conjunctions and the statistical query barrier. In STOC (2011), pp. 803-812.
-
(2011)
STOC
, pp. 803-812
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
22
-
-
84863421549
-
Iterative constructions and private data release
-
Gupta, A., Roth, A., and Ullman, J. Iterative constructions and private data release. In TCC (2012), pp. 339-356.
-
(2013)
TCC
, pp. 339-356
-
-
Gupta, A.1
Roth, A.2
Ullman, J.3
-
24
-
-
84877755332
-
A simple and practical algorithm for differentially private data release
-
Hardt, M., Ligett, K., and McSherry, F. A simple and practical algorithm for differentially private data release. In NIPS (2012), pp. 2348-2356.
-
(2013)
NIPS
, pp. 2348-2356
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
25
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Hardt, M., and Rothblum, G. N. A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS (2010), pp. 61-70.
-
(2010)
FOCS
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
26
-
-
77954711905
-
On the geometry of differential privacy
-
Hardt, M., and Talwar, K. On the geometry of differential privacy. In STOC (2010), pp. 705-714.
-
(2010)
STOC
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
27
-
-
77954693385
-
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows
-
Kasiviswanathan, S. P., Rudelson, M., Smith, A., and Ullman, J. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows. In STOC (2010), pp. 775-784.
-
(2010)
STOC
, pp. 775-784
-
-
Kasiviswanathan, S.P.1
Rudelson, M.2
Smith, A.3
Ullman, J.4
-
28
-
-
84879826933
-
The geometry of differential privacy: The sparse and approximate cases
-
Nikolov, A., Talwar, K., and Zhang, L. The geometry of differential privacy: the sparse and approximate cases. In STOC (2013), pp. 351-360.
-
(2013)
STOC
, pp. 351-360
-
-
Nikolov, A.1
Talwar, K.2
Zhang, L.3
-
29
-
-
78149311849
-
Differential privacy and the fat-shattering dimension of linear queries
-
Roth, A. Differential privacy and the fat-shattering dimension of linear queries. In APPROX-RANDOM (2010), pp. 683-695.
-
(2010)
Approx-Random
, pp. 683-695
-
-
Roth, A.1
-
30
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Roth, A., and Roughgarden, T. Interactive privacy via the median mechanism. In STOC (2010), pp. 765-774.
-
(2010)
STOC
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
31
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
Tardos, G. Optimal probabilistic fingerprint codes. J. ACM 55, 2 (2008).
-
(2008)
J. ACM
, vol.55
, pp. 2
-
-
Tardos, G.1
-
32
-
-
84879815183
-
Faster algorithms for privately releasing marginals
-
Thaler, J., Ullman, J., and Vadhan, S. P. Faster algorithms for privately releasing marginals. In ICALP (1) (2012), pp. 810-821.
-
(2012)
ICALP
, Issue.1
, pp. 810-821
-
-
Thaler, J.1
Ullman, J.2
Vadhan, S.P.3
-
33
-
-
84879825242
-
2+o(1) counting queries with differential privacy is hard
-
Ullman, J. Answering n2+o(1) counting queries with differential privacy is hard. In STOC (2013), pp. 361-370.
-
(2013)
STOC
, pp. 361-370
-
-
Ullman, J.1
|