-
1
-
-
80051990341
-
”you might also like:” privacy risks of collaborative filtering
-
J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov, “”you might also like:” privacy risks of collaborative filtering,” in IEEE Symposium on Security and Privacy, 2011, pp. 231–246.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 231-246
-
-
Calandrino, J. A.1
Kilzer, A.2
Narayanan, A.3
Felten, E. W.4
Shmatikov, V.5
-
2
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer
-
C. Dwork, F. Mcsherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proceedings of the 3rd Theory of Cryptography Conference. Springer, 2006, pp. 265–284.
-
(2006)
Proceedings of the 3rd Theory of Cryptography Conference
, pp. 265-284
-
-
Dwork, C.1
Mcsherry, F.2
Nissim, K.3
Smith, A.4
-
3
-
-
77954717626
-
Differential privacy under continual observation
-
C. Dwork, T. Pitassi, M. Naor, and G. N. Rothblum, “Differential privacy under continual observation,” in STOC, 2010, pp. 715–724.
-
(2010)
STOC
, pp. 715-724
-
-
Dwork, C.1
Pitassi, T.2
Naor, M.3
Rothblum, G. N.4
-
4
-
-
79960173817
-
Pan-private streaming algorithms
-
C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin, “Pan-private streaming algorithms,” in ICS, 2010, pp. 66–80.
-
(2010)
ICS
, pp. 66-80
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G. N.4
Yekhanin, S.5
-
5
-
-
77955334135
-
Private and continual release of statistics
-
[Online]. Available
-
T. H. H. Chan, E. Shi, and D. Song, “Private and continual release of statistics,” in ICALP, 2010, pp. 405–417. [Online]. Available: http://dl.acm.org/citation.cfm?id=1880999.1881044
-
(2010)
ICALP
, pp. 405-417
-
-
Chan, T. H. H.1
Shi, E.2
Song, D.3
-
6
-
-
79960182242
-
Pan-private algorithms via statistics on sketches
-
D. J. Mir, S. Muthukrishnan, A. Nikolov, and R. N. Wright, “Pan-private algorithms via statistics on sketches,” in PODS, 2011, pp. 37–48.
-
(2011)
PODS
, pp. 37-48
-
-
Mir, D. J.1
Muthukrishnan, S.2
Nikolov, A.3
Wright, R. N.4
-
7
-
-
84871058287
-
Real-time aggregate monitoring with differential privacy
-
L. Fan and L. Xiong, “Real-time aggregate monitoring with differential privacy,” in CIKM, 2012, pp. 2169–2173.
-
(2012)
CIKM
, pp. 2169-2173
-
-
Fan, L.1
Xiong, L.2
-
8
-
-
84883765200
-
Distributed private heavy hitters
-
J. Hsu, S. Khanna, and A. Roth, “Distributed private heavy hitters,” in ICALP (1), 2012, pp. 461–472.
-
(2012)
ICALP
, Issue.1
, pp. 461-472
-
-
Hsu, J.1
Khanna, S.2
Roth, A.3
-
9
-
-
34248385310
-
Toward sophisticated detection with distributed triggers
-
L. Huang, M. N. Garofalakis, J. M. Hellerstein, A. D. Joseph, and N. Taft, “Toward sophisticated detection with distributed triggers,” in MineNet, 2006, pp. 311–316.
-
(2006)
MineNet
, pp. 311-316
-
-
Huang, L.1
Garofalakis, M. N.2
Hellerstein, J. M.3
Joseph, A. D.4
Taft, N.5
-
10
-
-
34548536332
-
Efficient detection of distributed constraint violations
-
S. Agrawal, S. Deb, K. V. M. Naidu, and R. Rastogi, “Efficient detection of distributed constraint violations,” in ICDE, 2007, pp. 1320–1324.
-
(2007)
ICDE
, pp. 1320-1324
-
-
Agrawal, S.1
Deb, S.2
Naidu, K. V. M.3
Rastogi, R.4
-
12
-
-
70449100958
-
Functional monitoring without monotonicity
-
C. Arackaparambil, J. Brody, and A. Chakrabarti, “Functional monitoring without monotonicity,” in ICALP (1), 2009, pp. 95–106.
-
(2009)
ICALP
, Issue.1
, pp. 95-106
-
-
Arackaparambil, C.1
Brody, J.2
Chakrabarti, A.3
-
13
-
-
34250689976
-
A geometric approach to monitoring threshold functions over distributed data streams
-
I. Sharfman, A. Schuster, and D. Keren, “A geometric approach to monitoring threshold functions over distributed data streams,” in SIGMOD, 2006, pp. 301–312.
-
(2006)
SIGMOD
, pp. 301-312
-
-
Sharfman, I.1
Schuster, A.2
Keren, D.3
-
14
-
-
34548337359
-
Communication-efficient online detection of network-wide anomalies
-
L. Huang, X. L. Nguyen, M. Garofalakis, J. M. Hellerstein, M. I. Jordan, A. D. Joseph, and N. Taft, “Communication-efficient online detection of network-wide anomalies,” in INFOCOM, 2007.
-
(2007)
INFOCOM
-
-
Huang, L.1
Nguyen, X. L.2
Garofalakis, M.3
Hellerstein, J. M.4
Jordan, M. I.5
Joseph, A. D.6
Taft, N.7
-
15
-
-
34250622521
-
Communication-efficient distributed monitoring of thresholded counts
-
R. Keralapura, G. Cormode, and J. Ramamirtham, “Communication-efficient distributed monitoring of thresholded counts,” in SIGMOD Conference, 2006, pp. 289–300.
-
(2006)
SIGMOD Conference
, pp. 289-300
-
-
Keralapura, R.1
Cormode, G.2
Ramamirtham, J.3
-
16
-
-
1142291592
-
Adaptive filters for continuous queries over distributed data streams
-
C. Olston, J. Jiang, and J. Widom, “Adaptive filters for continuous queries over distributed data streams,” in SIGMOD Conference, 2003, pp. 563–574.
-
(2003)
SIGMOD Conference
, pp. 563-574
-
-
Olston, C.1
Jiang, J.2
Widom, J.3
-
17
-
-
84874716590
-
Differentially-private network trace analysis
-
Aug. [Online]. Available
-
F. McSherry and R. Mahajan, “Differentially-private network trace analysis,” SIGCOMM Computer Communication Review, vol. 40, no. 4, pp. 123–134, Aug. 2010. [Online]. Available: http://doi.acm.org/10.1145/1851275.1851199
-
(2010)
SIGCOMM Computer Communication Review
, vol.40
, Issue.4
, pp. 123-134
-
-
McSherry, F.1
Mahajan, R.2
-
18
-
-
84864133800
-
The application of differential privacy to health data
-
New York, NY, USA: ACM, [Online]. Available
-
F. K. Dankar and K. El Emam, “The application of differential privacy to health data,” in Proceedings of the 2012 Joint EDBT/ICDT Workshops, ser. EDBT-ICDT’12. New York, NY, USA: ACM, 2012, pp. 158–166. [Online]. Available: http://doi.acm.org/10.1145/2320765.2320816
-
(2012)
Proceedings of the 2012 Joint EDBT/ICDT Workshops, ser. EDBT-ICDT’12
, pp. 158-166
-
-
Dankar, F. K.1
El Emam, K.2
-
19
-
-
84879542647
-
Differential privacy in intelligent transportation systems
-
New York, NY, USA: ACM, [Online]. Available
-
F. Kargl, A. Friedman, and R. Boreli, “Differential privacy in intelligent transportation systems,” in Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec’13. New York, NY, USA: ACM, 2013, pp. 107–112. [Online]. Available: http://doi.acm.org/10.1145/2462096.2462114
-
(2013)
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, ser. WiSec’13
, pp. 107-112
-
-
Kargl, F.1
Friedman, A.2
Boreli, R.3
-
20
-
-
77952356233
-
Differential privacy for collaborative security
-
New York, NY, USA: ACM, [Online]. Available
-
J. Reed, A. J. Aviv, D. Wagner, A. Haeberlen, B. C. Pierce, and J. M. Smith, “Differential privacy for collaborative security,” in Proceedings of the Third European Workshop on System Security, ser. EUROSEC ’10. New York, NY, USA: ACM, 2010, pp. 1–7. [Online]. Available: http://doi.acm.org/10.1145/1752046.1752047
-
(2010)
Proceedings of the Third European Workshop on System Security, ser. EUROSEC ’10
, pp. 1-7
-
-
Reed, J.1
Aviv, A. J.2
Wagner, D.3
Haeberlen, A.4
Pierce, B. C.5
Smith, J. M.6
-
21
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer
-
C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise generation,” in EUROCRYPT. Springer, 2006, pp. 486–503.
-
(2006)
EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
Mcsherry, F.3
Mironov, I.4
Naor, M.5
-
22
-
-
51849137365
-
Distributed private data analysis: Simultaneously solving how and what
-
Berlin, Heidelberg: Springer-Verlag
-
A. Beimel, K. Nissim, and E. Omri, “Distributed private data analysis: Simultaneously solving how and what,” in Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology, ser. CRYPTO 2008. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 451–468.
-
(2008)
Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology, ser. CRYPTO 2008
, pp. 451-468
-
-
Beimel, A.1
Nissim, K.2
Omri, E.3
-
23
-
-
84910659277
-
Towards statistical queries over distributed private user data
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
R. Chen, A. Reznichenko, P. Francis, and J. Gehrke, “Towards statistical queries over distributed private user data,” in Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, ser. NSDI’12. Berkeley, CA, USA: USENIX Association, 2012, pp. 13–13. [Online]. Available: http://dl.acm.org/citation.cfm?id=2228298.2228316
-
(2012)
Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, ser. NSDI’12
, pp. 13-13
-
-
Chen, R.1
Reznichenko, A.2
Francis, P.3
Gehrke, J.4
-
24
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath, “Differentially private aggregation of distributed time-series with transformation and encryption,” in SIGMOD, 2010, pp. 735–746.
-
(2010)
SIGMOD
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
25
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, “Privacy-preserving aggregation of time-series data,” in NDSS, 2011.
-
(2011)
NDSS
-
-
Shi, E.1
Chan, T.-H. H.2
Rieffel, E. G.3
Chow, R.4
Song, D.5
-
26
-
-
84864265207
-
Differentially private continual monitoring of heavy hitters from distributed streams
-
T. H. H. Chan, M. Li, E. Shi, and W. Xu, “Differentially private continual monitoring of heavy hitters from distributed streams,” in Privacy Enhancing Technologies, 2012, pp. 140–159.
-
(2012)
Privacy Enhancing Technologies
, pp. 140-159
-
-
Chan, T. H. H.1
Li, M.2
Shi, E.3
Xu, W.4
-
27
-
-
57349119892
-
Shape sensitive geometric monitoring
-
New York, NY, USA: ACM, [Online]. Available
-
I. Sharfman, A. Schuster, and D. Keren, “Shape sensitive geometric monitoring,” in Proceedings of the Twenty-seventh ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems, ser. PODS’08. New York, NY, USA: ACM, 2008, pp. 301–310. [Online]. Available: http://doi.acm.org/10.1145/1376916.1376958
-
(2008)
Proceedings of the Twenty-seventh ACM SIGMODSIGACT-SIGART Symposium on Principles of Database Systems, ser. PODS’08
, pp. 301-310
-
-
Sharfman, I.1
Schuster, A.2
Keren, D.3
-
28
-
-
84863491341
-
Shape sensitive geometric monitoring
-
D. Keren, I. Sharfman, A. Schuster, and A. Livne, “Shape sensitive geometric monitoring,” IEEE Transactions on Knowledge and Data Engineering, vol. 24, no. 8, pp. 1520–1535, 2012.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
, vol.24
, Issue.8
, pp. 1520-1535
-
-
Keren, D.1
Sharfman, I.2
Schuster, A.3
Livne, A.4
-
29
-
-
84864229980
-
Detecting outliers in sensor networks using the geometric approach
-
S. Burdakis and A. Deligiannakis, “Detecting outliers in sensor networks using the geometric approach,” in ICDE, 2012, pp. 1108–1119.
-
(2012)
ICDE
, pp. 1108-1119
-
-
Burdakis, S.1
Deligiannakis, A.2
-
30
-
-
84863421549
-
Iterative constructions and private data release
-
A. Gupta, A. Roth, and J. Ullman, “Iterative constructions and private data release,” in TCC, 2012, pp. 339–356.
-
(2012)
TCC
, pp. 339-356
-
-
Gupta, A.1
Roth, A.2
Ullman, J.3
-
31
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar, “Mechanism design via differential privacy,” in FOCS, 2007, pp. 94–103.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
32
-
-
36949013219
-
A geometric approach to monitoring threshold functions over distributed data streams
-
Nov. [Online]. Available
-
I. Sharfman, A. Schuster, and D. Keren, “A geometric approach to monitoring threshold functions over distributed data streams,” ACM Transactions on Database Systems (TODS), vol. 32, no. 4, Nov. 2007. [Online]. Available: http://doi.acm.org/10.1145/1292609.1292613
-
(2007)
ACM Transactions on Database Systems (TODS)
, vol.32
, Issue.4
-
-
Sharfman, I.1
Schuster, A.2
Keren, D.3
-
33
-
-
84876811202
-
Rcv1: A new benchmark collection for text categorization research
-
Dec. [Online]. Available
-
D. D. Lewis, Y. Yang, T. G. Rose, and F. Li, “Rcv1: A new benchmark collection for text categorization research,” Journal of Machine Learning Research, vol. 5, pp. 361–397, Dec. 2004. [Online]. Available: http://dl.acm.org/citation.cfm?id=1005332.1005345
-
(2004)
Journal of Machine Learning Research
, vol.5
, pp. 361-397
-
-
Lewis, D. D.1
Yang, Y.2
Rose, T. G.3
Li, F.4
-
34
-
-
84862665086
-
Prediction-based geometric monitoring over distributed data streams
-
New York, NY, USA: ACM, [Online]. Available
-
N. Giatrakos, A. Deligiannakis, M. Garofalakis, I. Sharfman, and A. Schuster, “Prediction-based geometric monitoring over distributed data streams,” in Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD’12. New York, NY, USA: ACM, 2012, pp. 265–276. [Online]. Available: http://doi.acm.org/10.1145/2213836.2213867
-
(2012)
Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD’12
, pp. 265-276
-
-
Giatrakos, N.1
Deligiannakis, A.2
Garofalakis, M.3
Sharfman, I.4
Schuster, A.5
-
35
-
-
84904666453
-
Geometric monitoring of heterogeneous streams
-
D. Keren, G. Sagy, A. Abboud, D. Ben-David, A. Schuster, I. Sharfman, and A. Deligiannakis, “Geometric monitoring of heterogeneous streams,” IEEE Transactions on Knowledge and Data Engineering, 2014.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
-
-
Keren, D.1
Sagy, G.2
Abboud, A.3
Ben-David, D.4
Schuster, A.5
Sharfman, I.6
Deligiannakis, A.7
|