메뉴 건너뛰기




Volumn 2, Issue , 2015, Pages 1376-1385

The composition theorem for differential privacy

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; DATA HANDLING; PRIVATIZATION; QUERY PROCESSING;

EID: 84969812974     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (435)

References (33)
  • 1
    • 84938171492 scopus 로고
    • The convolution inequality for entropy powers
    • Blachman, N. The convolution inequality for entropy powers. Information Theory, IEEE Transactions on, 11(2): 267-271, 1965.
    • (1965) Information Theory, IEEE Transactions on , vol.11 , Issue.2 , pp. 267-271
    • Blachman, N.1
  • 2
    • 0000129333 scopus 로고
    • Equivalent comparisons of experiments
    • Blackwell, David. Equivalent comparisons of experiments. The Annals of Mathematical Statistics, 24(2):265-272, 1953.
    • (1953) The Annals of Mathematical Statistics , vol.24 , Issue.2 , pp. 265-272
    • Blackwell, D.1
  • 5
    • 84877909042 scopus 로고    scopus 로고
    • A learning theory approach to noninteractive database privacy
    • Blum, Avrim, Ligett, Katrina, and Roth, Aaron. A learning theory approach to noninteractive database privacy. Journal of the ACM (JACM), 60(2): 12, 2013.
    • (2013) Journal of the ACM (JACM) , vol.60 , Issue.2 , pp. 12
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 12
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Springer
    • Dwork, Cynthia and Nissim, Kobbi. Privacy-preserving datamining on vertically partitioned databases. In Advances in Cryptology-CRYPTO 2004, pp. 528-544. Springer, 2004.
    • (2004) Advances in Cryptology-CRYPTO 2004 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 14
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • Springer
    • Dwork, Cynthia, McSherry, Frank, Nissim, Kobbi, and Smith, Adam. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, pp. 265-284. Springer, 2006b.
    • (2006) Theory of Cryptography , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 18
    • 84871605204 scopus 로고    scopus 로고
    • Universally utility-maximizing privacy mechanisms
    • Ghosh, Arpita, Roughgarden, Tim, and Sundararajan, Mukund. Universally utility-maximizing privacy mechanisms. SIAM Journal on Computing, 41(6): 1673-1693, 2012.
    • (2012) SIAM Journal on Computing , vol.41 , Issue.6 , pp. 1673-1693
    • Ghosh, A.1    Roughgarden, T.2    Sundararajan, M.3
  • 20
    • 84863421549 scopus 로고    scopus 로고
    • Iterative constructions and private data release
    • Springer
    • Gupta, Anupam, Roth, Aaron, and Ullman, Jonathan. Iterative constructions and private data release. In Theory of Cryptography, pp. 339-356. Springer, 2012.
    • (2012) Theory of Cryptography , pp. 339-356
    • Gupta, A.1    Roth, A.2    Ullman, J.3
  • 25
    • 34248373869 scopus 로고    scopus 로고
    • An extremal inequality motivated by multiterminal information-theoretic problems
    • Liu, Tie and Viswanath, Pramod. An extremal inequality motivated by multiterminal information-theoretic problems. Information Theory, IEEE Transactions on, 53(5): 1839-1851, 2007.
    • (2007) Information Theory, IEEE Transactions on , vol.53 , Issue.5 , pp. 1839-1851
    • Liu, T.1    Viswanath, P.2
  • 29
    • 12944295719 scopus 로고
    • Some inequalities satisfied by the quantities of information of fisher and shannon
    • Stam, AJ. Some inequalities satisfied by the quantities of information of fisher and shannon. Information and Control, 2(2): 101-112, 1959.
    • (1959) Information and Control , vol.2 , Issue.2 , pp. 101-112
    • Stam, A.J.1
  • 30
    • 57049109249 scopus 로고    scopus 로고
    • The primes contain arbitrarily long polynomial progressions
    • Tao, Terence and Ziegler, Tamar. The primes contain arbitrarily long polynomial progressions. Acta Mathematica, 201(2):213-305, 2008.
    • (2008) Acta Mathematica , vol.201 , Issue.2 , pp. 213-305
    • Tao, T.1    Ziegler, T.2
  • 31
    • 33646020998 scopus 로고    scopus 로고
    • A simple proof of the entropy-power inequality
    • Verdu, Sergio and Guo, Dongning. A simple proof of the entropy-power inequality. IEEE Transactions on Information Theory, 52(5):2165-2166, 2006.
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.5 , pp. 2165-2166
    • Verdu, S.1    Guo, D.2
  • 33
    • 0032075574 scopus 로고    scopus 로고
    • A proof of the fisher information inequality via a data processing argument
    • Zamir, Ram. A proof of the fisher information inequality via a data processing argument. Information Theory, IEEE Transactions on, 44(3): 1246-1250, 1998.
    • (1998) Information Theory, IEEE Transactions on , vol.44 , Issue.3 , pp. 1246-1250
    • Zamir, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.