-
1
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
IEEE Computer Society
-
S. Agrawal and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In ICDE, pages 193-204. IEEE Computer Society, 2005.
-
(2005)
ICDE
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
3
-
-
84871941776
-
The johnson-lindenstrauss transform itself preserves differential privacy
-
FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012
-
J. Blocki, A. Blum, A. Datta, and O. Sheffet. The johnson-lindenstrauss transform itself preserves differential privacy. In 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 410-419, 2012.
-
(2012)
53rd Annual IEEE Symposium on Foundations of Computer Science
, pp. 410-419
-
-
Blocki, J.1
Blum, A.2
Datta, A.3
Sheffet, O.4
-
5
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
Springer
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, LNCS, pages 528-544. Springer, 2004.
-
(2004)
CRYPTO, LNCS
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
6
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, pages 265-284. Springer, 2006.
-
(2006)
Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
7
-
-
77954717626
-
Differential privacy under continual observation
-
ACM
-
C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. STOC '10, pages 715-724. ACM, 2010.
-
(2010)
STOC '10
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
-
8
-
-
79960173817
-
Pan-private streaming algorithms
-
C. Dwork, M. Noar, T. Pitassi, G. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Symposium on Innovations in Computer Science (ICS), 2010.
-
(2010)
Symposium on Innovations in Computer Science (ICS)
-
-
Dwork, C.1
Noar, M.2
Pitassi, T.3
Rothblum, G.4
Yekhanin, S.5
-
10
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
ACM
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222. ACM, 2003.
-
(2003)
PODS
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
12
-
-
0036041770
-
Near-optimal sparse fourier representations via sampling
-
ACM
-
A. C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, and M. Strauss. Near-optimal sparse fourier representations via sampling. STOC 2002, pages 152-161. ACM, 2002.
-
(2002)
STOC
, pp. 152-161
-
-
Gilbert, A.C.1
Guha, S.2
Indyk, P.3
Muthukrishnan, S.4
Strauss, M.5
-
14
-
-
84883765200
-
Distributed private heavy hitters
-
J. Hsu, S. Khanna, and A. Roth. Distributed private heavy hitters. In ICALP (1), pages 461-472, 2012.
-
(2012)
ICALP
, Issue.1
, pp. 461-472
-
-
Hsu, J.1
Khanna, S.2
Roth, A.3
-
15
-
-
57949111704
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhod-nikova, and A. Smith. What can we learn privately? In FOCS, 2008.
-
(2008)
FOCS
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhod-Nikova, S.4
Smith, A.5
-
16
-
-
0032202014
-
Efficient noise-tolerant learning from statistical queries
-
Preliminary version in proceedings of STOC'93
-
M. Kearns. Efficient noise-tolerant learning from statistical queries. Journal of the ACM, 45(6):983-1006, 1998. ISSN 0004-5411. Preliminary version in proceedings of STOC'93.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 983-1006
-
-
Kearns, M.1
-
17
-
-
84904551955
-
-
CoRR, abs/1204.2606
-
K. Kenthapadi, A. Korolova, I. Mironov, and N. Mishra. Privacy via the johnson-lindenstrauss transform. CoRR, abs/1204.2606, 2012.
-
(2012)
Privacy Via the Johnson-lindenstrauss Transform
-
-
Kenthapadi, K.1
Korolova, A.2
Mironov, I.3
Mishra, N.4
-
18
-
-
85006528164
-
Learning decision trees using the fourier spectrum
-
ACM
-
E. Kushilevitz and Y. Mansour. Learning decision trees using the fourier spectrum. STOC'91, pages 455-464. ACM, 1991.
-
(1991)
STOC'91
, pp. 455-464
-
-
Kushilevitz, E.1
Mansour, Y.2
-
19
-
-
0001035413
-
On the method of bounded differences
-
Cambridge University Press
-
C. McDiarmid. On the method of bounded differences. In In Surveys in Combinatorics, pages 148-188. Cambridge University Press, 1989.
-
(1989)
Surveys in Combinatorics
, pp. 148-188
-
-
McDiarmid, C.1
-
20
-
-
78751557330
-
The limits of two-party differential privacy
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. P. Vadhan. The limits of two-party differential privacy. In FOCS, pages 81-90, 2010.
-
(2010)
FOCS
, pp. 81-90
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.P.6
-
21
-
-
34250642810
-
Privacy via pseudorandom sketches
-
ACM
-
N. Mishra and M. Sandler. Privacy via pseudorandom sketches. In PODS, pages 143-152. ACM, 2006.
-
(2006)
PODS
, pp. 143-152
-
-
Mishra, N.1
Sandler, M.2
-
22
-
-
84892392012
-
Random projections, graph sparsification, and differential privacy
-
J. Upadhyay. Random projections, graph sparsification, and differential privacy. In Advances in Cryptology - ASIACRYPT, pages 276-295, 2013.
-
(2013)
Advances in Cryptology - ASIACRYPT
, pp. 276-295
-
-
Upadhyay, J.1
|