-
1
-
-
84871023469
-
The multiplicative weights update method: A meta-algorithm and applications
-
S. Arora, E. Hazan, and S. Kale. The multiplicative weights update method: A meta-algorithm and applications. Theory of Computing, 8(1):121-164, 2012.
-
(2012)
Theory of Computing
, vol.8
, Issue.1
, pp. 121-164
-
-
Arora, S.1
Hazan, E.2
Kale, S.3
-
2
-
-
33748593645
-
Mechanism design via machine learning
-
IEEE
-
M.-F. Balcan, A. Blum, J. D. Hartline, and Y. Mansour. Mechanism design via machine learning. In Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on, pages 605-614. IEEE, 2005.
-
(2005)
Foundations of Computer Science 2005. FOCS 2005. 46th Annual IEEE Symposium on
, pp. 605-614
-
-
Balcan, M.-F.1
Blum, A.2
Hartline, J.D.3
Mansour, Y.4
-
3
-
-
77949617188
-
Bounds on the sample complexity for private learning and private data release
-
Springer
-
A. Beimel, S. P. Kasiviswanathan, and K. Nissim. Bounds on the sample complexity for private learning and private data release. In Theory of Cryptography, pages 437-454. Springer, 2010.
-
(2010)
Theory of Cryptography
, pp. 437-454
-
-
Beimel, A.1
Kasiviswanathan, S.P.2
Nissim, K.3
-
5
-
-
84862590720
-
Unconditional differentially private mechanisms for linear queries
-
H. J. Karloff and T. Pitassi, editors
-
A. Bhaskara, D. Dadush, R. Krishnaswamy, and K. Talwar. Unconditional differentially private mechanisms for linear queries. In H. J. Karloff and T. Pitassi, editors, Proceedings of the Symposium on Theory of Computing Conference, Symposium on Theory of Computing, New York, NY, USA, May 19-22, 2012, pages 1269-1284. 2012.
-
(2012)
Proceedings of the Symposium on Theory of Computing Conference, Symposium on Theory of Computing, New York, NY, USA, May 19-22 2012
, pp. 1269-1284
-
-
Bhaskara, A.1
Dadush, D.2
Krishnaswamy, R.3
Talwar, K.4
-
6
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
Chen Li, editor ACM
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Chen Li, editor, Principles of Database Systems, pages 128-138. ACM, 2005.
-
(2005)
Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
8
-
-
57049136138
-
A learning theory approach to noninteractive database privacy
-
Cynthia Dwork, editor. Association for Computing Machinery
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to noninteractive database privacy. In Cynthia Dwork, editor, Symposium on Theory of Computing, pages 609-618. Association for Computing Machinery, 2008.
-
(2008)
Symposium on Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
11
-
-
77955334135
-
Private and continual release of statistics
-
Springer
-
T. H. Hubert Chan, E. Shi, and D. Song. Private and continual release of statistics. In Automata, Languages and Programming, pages 405-417. Springer, 2010.
-
(2010)
Automata, Languages and Programming
, pp. 405-417
-
-
Hubert Chan, T.H.1
Shi, E.2
Song, D.3
-
15
-
-
84879756092
-
Truthful mechanisms for agents that value privacy
-
Y. Chen, S. Chong, I. A. Kash, T. Moran, and S. P. Vadhan. Truthful mechanisms for agents that value privacy. Association for Computing Machinery Conference on Electronic Commerce, 2013.
-
(2013)
Association for Computing Machinery Conference on Electronic Commerce
-
-
Chen, Y.1
Chong, S.2
Kash, I.A.3
Moran, T.4
Vadhan, P.S.5
-
17
-
-
84858307870
-
Lower bounds in differential privacy
-
A. De. Lower bounds in differential privacy. In Theory of Cryptography Conference, pages 321-338. 2012.
-
(2012)
Theory of Cryptography Conference
, pp. 321-338
-
-
De, A.1
-
21
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT, pages 486-503. 2006.
-
(2006)
EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
23
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference '06, pages 265-284. 2006.
-
(2006)
Theory of Cryptography Conference
, vol.6
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
25
-
-
79959952201
-
On the difficulties of disclosure prevention in statistical databases or the case for differential privacy
-
C. Dwork and M. Naor. On the difficulties of disclosure prevention in statistical databases or the case for differential privacy. Journal of Privacy and Confidentiality, 2010.
-
(2010)
Journal of Privacy and Confidentiality
-
-
Dwork, C.1
Naor, M.2
-
26
-
-
77954717626
-
Differential privacy under continual observation
-
Association for Computing Machinery
-
C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. In Proceedings of the Association for Computing Machinery Symposium on Theory of Computing, pages 715-724. Association for Computing Machinery, 2010.
-
(2010)
Proceedings of the Association for Computing Machinery Symposium on Theory of Computing
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, N.G.4
-
28
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. P. Vadhan. On the complexity of differentially private data release: Efficient algorithms and hardness results. In Symposium on Theory of Computing '09, pages 381-390. 2009.
-
(2009)
Symposium on Theory of Computing
, vol.9
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.P.5
-
31
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In Proceedings of Cryptology 2004, vol. 3152, pages 528-544. 2004.
-
(2004)
Proceedings of Cryptology
, vol.3152
, Issue.2004
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
38
-
-
79959740503
-
Privately releasing conjunctions and the statistical query barrier
-
A. Gupta, M. Hardt, A. Roth, and J. Ullman. Privately releasing conjunctions and the statistical query barrier. In Symposium on Theory of Computing '11, pages 803-812. 2011.
-
(2011)
Symposium on Theory of Computing '
, vol.11
, pp. 803-812
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
40
-
-
0345253860
-
A pseudorandom generator from any one-way function
-
J. Hastad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM Journal of Computing, 28, 1999.
-
(1999)
SIAM Journal of Computing
, vol.28
-
-
Hastad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
42
-
-
84862594279
-
Beating randomized response on incoherent matrices
-
Association for Computing Machinery
-
M. Hardt and A. Roth. Beating randomized response on incoherent matrices. In Proceedings of the Symposium on Theory of Computing, pages 1255-1268. Association for Computing Machinery, 2012.
-
(2012)
Proceedings of the Symposium on Theory of Computing
, pp. 1255-1268
-
-
Hardt, M.1
Roth, A.2
-
44
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
IEEE Computer Society
-
M. Hardt and G. N. Rothblum. A multiplicative weights mechanism for privacy-preserving data analysis. In Foundations of Computer Science, pages 61-70. IEEE Computer Society, 2010.
-
(2010)
Foundations of Computer Science
, pp. 61-70
-
-
Hardt, M.1
Rothblum, N.G.2
-
46
-
-
50849101381
-
Resolving individuals contributing trace amounts of dna to highly complex mixtures using highdensity snp genotyping microarrays
-
N. Homer, S. Szelinger, M. Redman, D. Duggan,W. Tembe, J. Muehling, J. Pearson, D. Stephan, S. Nelson, and D. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using highdensity snp genotyping microarrays. PLoS Genet, 4, 2008.
-
(2008)
PLoS Genet
, vol.4
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Dugganw. Tembe, D.4
Muehling, J.5
Pearson, J.6
Stephan, D.7
Nelson, S.8
Craig, D.9
-
47
-
-
84903123239
-
-
ArXiv preprint arXiv.1311.2828
-
J. Hsu, Z. Huang, A. Roth, T. Roughgarden, and Z. S. Wu. Private matchings and allocations. arXiv preprint arXiv:1311.2828, 2013.
-
(2013)
Private Matchings and Allocations
-
-
Hsu, J.1
Huang, Z.2
Roth, A.3
Roughgarden, T.4
Wu, Z.S.5
-
51
-
-
84876059763
-
On differentially private low rank approximation. in Sanjeev Khanna, editor
-
SIAM
-
M. Kapralov and K. Talwar. On differentially private low rank approximation. In Sanjeev Khanna, editor, Symposium on Discrete Algorthims, pages 1395-1414. SIAM, 2013.
-
(2013)
Symposium on Discrete Algorthims
, pp. 1395-1414
-
-
Kapralov, M.1
Talwar, K.2
-
52
-
-
79960379430
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, Kobbi Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? SIAM Journal on Computing, 40(3):793-826, 2011.
-
(2011)
SIAM Journal on Computing
, vol.40
, Issue.3
, pp. 793-826
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
55
-
-
84893149822
-
Private convex empirical risk minimization and high-dimensional regression
-
D. Kifer, A. Smith, and A. Thakurta. Private convex empirical risk minimization and high-dimensional regression. Journal of Machine Learning Research, 1:41, 2012.
-
(2012)
Journal of Machine Learning Research
, vol.1
, Issue.41
-
-
Kifer, D.1
Smith, A.2
Thakurta, A.3
-
56
-
-
84871390246
-
Take it or leave it: Running a survey when privacy comes at a cost
-
Springer
-
K. Ligett and A. Roth. Take it or leave it: Running a survey when privacy comes at a cost. In Internet and Network Economics, pages 378-391. Springer, 2012.
-
(2012)
Internet and Network Economics
, pp. 378-391
-
-
Ligett, K.1
Roth, A.2
-
58
-
-
78751557330
-
The limits of two-party differential privacy
-
IEEE Computer Society
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. P. Vadhan. The limits of two-party differential privacy. In Foundations of Computer Science, pages 81-90. IEEE Computer Society, 2010.
-
(2010)
Foundations of Computer Science
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, P.S.6
-
62
-
-
79960182242
-
Pan-private algorithms via statistics on sketches
-
Association for Computing Machinery
-
D. Mir, S. Muthukrishnan, A. Nikolov, and R. N. Wright. Pan-private algorithms via statistics on sketches. In Proceedings of the Association for Computing Machinery SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pages 37-48. Association for Computing Machinery, 2011.
-
(2011)
Proceedings of the Association for Computing Machinery SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 37-48
-
-
Mir, D.1
Muthukrishnan, S.2
Nikolov, A.3
Wright, N.R.4
-
63
-
-
84869429647
-
On significance of the least significant bits for differential privacy
-
T. Yu, G. Danezis, and V. D. Gligor, editors. Association for Computing Machinery
-
I. Mironov. On significance of the least significant bits for differential privacy. In T. Yu, G. Danezis, and V. D. Gligor, editors, Association for Computing Machinery Conference on Computer and Communications Security, pages 650-661. Association for Computing Machinery, 2012.
-
(2012)
Association for Computing Machinery Conference on Computer and Communications Security
, pp. 650-661
-
-
Mironov, I.1
-
72
-
-
78149311849
-
Differential privacy and the fat-shattering dimension of linear queries
-
Springer
-
A. Roth. Differential privacy and the fat-shattering dimension of linear queries. In Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques, pages 683-695. Springer, 2010.
-
(2010)
Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques
, pp. 683-695
-
-
Roth, A.1
-
73
-
-
84875627441
-
Buying private data at auction: The sensitive surveyor's problem
-
A. Roth. Buying private data at auction: the sensitive surveyor's problem. Association for Computing Machinery SIGecom Exchanges, 11(1):1- 8, 2012.
-
(2012)
Association for Computing Machinery SIGecom Exchanges
, vol.11
, Issue.1
, pp. 1-8
-
-
Roth, A.1
-
77
-
-
0037806811
-
The boosting approach to machine learning: An overview
-
D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors Springer
-
R. Schapire. The boosting approach to machine learning: An overview. In D. D. Denison, M. H. Hansen, C. Holmes, B. Mallick, and B. Yu, editors, Nonlinear Estimation and Classification. Springer, 2003.
-
(2003)
Nonlinear Estimation and Classification
-
-
Schapire, R.1
-
78
-
-
0033281701
-
Improved boosting algorithms using confidence-rated predictions
-
R. Schapire and Y. Singer. Improved boosting algorithms using confidence-rated predictions. Machine Learning, 39:297-336, 1999.
-
(1999)
Machine Learning
, vol.39
, pp. 297-336
-
-
Schapire, R.1
Singer, Y.2
-
80
-
-
84937945584
-
Differentially private feature selection via stability arguments, and the robustness of the lasso
-
A. Smith and A. G. Thakurta. Differentially private feature selection via stability arguments, and the robustness of the lasso. In Proceedings of Conference on Learning Theory. 2013.
-
(2013)
Proceedings of Conference on Learning Theory
-
-
Smith, A.1
Thakurta, G.A.2
-
81
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicines Ethics, 25:98-110, 1997.
-
(1997)
Journal of Law, Medicines Ethics
, vol.25
, pp. 98-110
-
-
Sweeney, L.1
-
82
-
-
84879825242
-
{2+o(1)} counting queries with differential privacy is hard
-
D. Boneh, T. Roughgarden, and J. Feigenbaum, editors. Association for Computing Machinery
-
{2+o(1)} counting queries with differential privacy is hard. In D. Boneh, T. Roughgarden, and J. Feigenbaum, editors, Symposium on Theory of Computing, pages 361-370. Association for Computing Machinery, 2013.
-
(2013)
Symposium on Theory of Computing
, pp. 361-370
-
-
Ullman, J.1
-
84
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|