-
1
-
-
84919960722
-
Guilt-free data exploration (tentative title)
-
C. Dwork, V. Feldman, M. Hardt, T. Pitassi, O. Reingold, and A. Roth, "Guilt-free data exploration (tentative title)," Manuscript, 2014.
-
(2014)
Manuscript
-
-
Dwork, C.1
Feldman, V.2
Hardt, M.3
Pitassi, T.4
Reingold, O.5
Roth, A.6
-
2
-
-
0001677717
-
Controlling the false discovery rate: A practical and powerful approach to multiple testing
-
Y. Benjamini and Y. Hochberg, "Controlling the false discovery rate: a practical and powerful approach to multiple testing," Journal of the Royal Statistical Society. Series B (Methodological), vol. 57, no. 1, pp. 289-300, 1995.
-
(1995)
Journal of the Royal Statistical Society. Series B (Methodological)
, vol.57
, Issue.1
, pp. 289-300
-
-
Benjamini, Y.1
Hochberg, Y.2
-
3
-
-
0027188175
-
Efficient noise-tolerant learning from statistical queries
-
S. R. Kosaraju D. S. Johnson, and A. Aggarwal, Eds ACM
-
M. J. Kearns, "Efficient noise-tolerant learning from statistical queries," in STOC, S. R. Kosaraju, D. S. Johnson, and A. Aggarwal, Eds. ACM, 1993, pp. 392-401.
-
(1993)
STOC
, pp. 392-401
-
-
Kearns, M.J.1
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Transactions on Information Theory, vol. 44, no. 5, pp. 1897-1905, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
84904197571
-
Fingerprinting codes and the price of approximate differential privacy
-
May 31-June 3
-
M. Bun, J. Ullman, and S. P. Vadhan, "Fingerprinting codes and the price of approximate differential privacy," in STOC. ACM, May 31-June 3 2014, pp. 1-10.
-
(2014)
STOC ACM
, pp. 1-10
-
-
Bun, M.1
Ullman, J.2
Vadhan, S.P.3
-
6
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
TCC, ser S. Halevi and T. Rabin, Eds. Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in TCC, ser. Lecture Notes in Computer Science, S. Halevi and T. Rabin, Eds., vol. 3876. Springer, 2006, pp. 265-284.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
7
-
-
84879825242
-
Answering n2+o(1) counting queries with differential privacy is hard
-
D. Boneh, T. Roughgarden, and J. Feigenbaum, Eds ACM
-
J. Ullman, "Answering n2+o(1) counting queries with differential privacy is hard," in STOC, D. Boneh, T. Roughgarden, and J. Feigenbaum, Eds. ACM, 2013, pp. 361-370.
-
(2013)
STOC
, pp. 361-370
-
-
Ullman, J.1
-
11
-
-
84985922619
-
Tracing traitors
-
CRYPTO, ser Y. Desmedt, Ed. Springer
-
B. Chor, A. Fiat, and M. Naor, "Tracing traitors," in CRYPTO, ser. Lecture Notes in Computer Science, Y. Desmedt, Ed., vol. 839. Springer, 1994, pp. 257-270.
-
(1994)
Lecture Notes in Computer Science
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
12
-
-
70350689921
-
On the complexity of differentially private data release: Efficient algorithms and hardness results
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. P. Vadhan, "On the complexity of differentially private data release: efficient algorithms and hardness results," in STOC. ACM, 2009, pp. 381-390.
-
(2009)
STOC ACM
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.P.5
-
13
-
-
84879825768
-
How robust are linear sketches to adaptive inputs
-
D. Boneh, T. Roughgarden, and J. Feigenbaum, Eds ACM
-
M. Hardt and D. P. Woodruff, "How robust are linear sketches to adaptive inputs " in STOC, D. Boneh, T. Roughgarden, and J. Feigenbaum, Eds. ACM, 2013, pp. 121-130.
-
(2013)
STOC
, pp. 121-130
-
-
Hardt, M.1
Woodruff, D.P.2
-
14
-
-
43949123848
-
Optimal probabilistic fingerprint codes
-
G. Tardos, "Optimal probabilistic fingerprint codes," J. ACM, vol. 55, no. 2, 2008.
-
(2008)
J. ACM
, vol.55
, Issue.2
-
-
Tardos, G.1
|