-
1
-
-
80052243933
-
Bayesian learning in social networks
-
Oct
-
Acemoglu, D., Dahleh, M. A., Lobel, I., and Ozdaglar, A. Bayesian learning in social networks. Review of Econ. Stud. 78, 4 (Oct. 2011), 1201-1236.
-
(2011)
Review of Econ. Stud
, vol.78
, Issue.4
, pp. 1201-1236
-
-
Acemoglu, D.1
Dahleh, M.A.2
Lobel, I.3
Ozdaglar, A.4
-
2
-
-
84958771236
-
Local, private, efficient protocols for succinct histograms
-
Portland, OR
-
Bassily, R., and Smith, A. Local, private, efficient protocols for succinct histograms. In Proc. Ann. ACM Symp. Theory of Computing (STOC) (Portland, OR, 2015), pp. 127-135.
-
(2015)
Proc. Ann. ACM Symp. Theory of Computing (STOC)
, pp. 127-135
-
-
Bassily, R.1
Smith, A.2
-
3
-
-
84879756092
-
Truthful mechanisms for agents that value privacy
-
Philadelphia, PA
-
Chen, Y., Chong, S., Kash, I. A., Moran, T., and Vadhan, S. Truthful mechanisms for agents that value privacy. In Proc. ACM Conf. Electronic Commerce (EC) (Philadelphia, PA, 2013), pp. 215-232.
-
(2013)
Proc. ACM Conf. Electronic Commerce (EC)
, pp. 215-232
-
-
Chen, Y.1
Chong, S.2
Kash, I.A.3
Moran, T.4
Vadhan, S.5
-
4
-
-
84914162244
-
Privacy games
-
Chen, Y., Sheffet, O., and Vadhan, S. Privacy games. In Int. Conf. Web and Internet Economics (WINE) (2014), vol. 8877, pp. 371-385.
-
(2014)
Int. Conf. Web and Internet Economics (WINE)
, vol.8877
, pp. 371-385
-
-
Chen, Y.1
Sheffet, O.2
Vadhan, S.3
-
5
-
-
84889281816
-
-
2nd ed. John Wiley & Sons, Hoboken, NJ
-
Cover, T. M., and Thomas, J. A. Elements of Information Theory, 2nd ed. John Wiley & Sons, Hoboken, NJ, 2006.
-
(2006)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
6
-
-
84898735280
-
Local privacy and minimax bounds: Sharp rates for probability estimation
-
Lake Tahoe, NV, Dec
-
Duchi, J. C., Jordan, M. I., and Wainwright, M. J. Local privacy and minimax bounds: Sharp rates for probability estimation. In Advances Neural Information Processing Systems (NIPS) (Lake Tahoe, NV, Dec. 2013), pp. 1529-1537.
-
(2013)
Advances Neural Information Processing Systems (NIPS)
, pp. 1529-1537
-
-
Duchi, J.C.1
Jordan, M.I.2
Wainwright, M.J.3
-
8
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
New York, NY
-
Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In Proc. Conf. Theory of Cryptography (TCC) (New York, NY, 2006), pp. 265-284.
-
(2006)
Proc. Conf. Theory of Cryptography (TCC)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
9
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
Aug. 2014
-
Dwork, C., and Roth, A. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3-4 (Aug. 2014), 211-407.
-
Found. Trends Theor. Comput. Sci
, vol.9
, Issue.3-4
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
10
-
-
84910685712
-
RAPPOR: Randomized aggregate able privacy-preserving ordinal response
-
Scottsdale, AZ
-
Erlingsson, Ú., Pihur, V., and Korolova, A. RAPPOR: Randomized aggregate able privacy-preserving ordinal response. In Proc. ACM SIGSAC Conf. Computer and Communication Security (CCS) (Scottsdale, AZ, 2014), pp. 1054-1067.
-
(2014)
Proc. ACM SIGSAC Conf. Computer and Communication Security (CCS)
, pp. 1054-1067
-
-
Erlingsson, U.1
Pihur, V.2
Korolova, A.3
-
12
-
-
84863535268
-
Approximately optimal auctions for selling privacy when costs are correlated with data
-
Valencia, Spain
-
Fleischer, L. K., and Lyu, Y. Approximately optimal auctions for selling privacy when costs are correlated with data. In Proc. ACM Conf. Electronic Commerce (EC) (Valencia, Spain, 2012), pp. 568-585.
-
(2012)
Proc. ACM Conf. Electronic Commerce (EC)
, pp. 568-585
-
-
Fleischer, L.K.1
Lyu, Y.2
-
13
-
-
84879778250
-
Privacy and coordination: Computing on databases with endogenous participation
-
Philadelphia, PA
-
Ghosh, A., and Ligett, K. Privacy and coordination: Computing on databases with endogenous participation. In Proc. ACM Conf. Electronic Commerce (EC) (Philadelphia, PA, 2013), pp. 543-560.
-
(2013)
Proc. ACM Conf. Electronic Commerce (EC)
, pp. 543-560
-
-
Ghosh, A.1
Ligett, K.2
-
14
-
-
84903172200
-
Buying private data without verification
-
Palo Alto, CA
-
Ghosh, A., Ligett, K., Roth, A., and Schoenebeck, G. Buying private data without verification. In Proc. ACM Conf. Economics and Computation (EC) (Palo Alto, CA, 2014), pp. 931-948.
-
(2014)
Proc. ACM Conf. Economics and Computation (EC)
, pp. 931-948
-
-
Ghosh, A.1
Ligett, K.2
Roth, A.3
Schoenebeck, G.4
-
15
-
-
79959622530
-
Selling privacy at auction
-
San Jose, CA
-
Ghosh, A., and Roth, A. Selling privacy at auction. In Proc. ACM Conf. Electronic Commerce (EC) (San Jose, CA, 2011), pp. 199-208.
-
(2011)
Proc. ACM Conf. Electronic Commerce (EC)
, pp. 199-208
-
-
Ghosh, A.1
Roth, A.2
-
16
-
-
84883765200
-
Distributed private heavy hitters
-
Warwick, UK
-
Hsu, J., Khanna, S., and Roth, A. Distributed private heavy hitters. In Proc. Int. Conf. Automata, Languages and Programming (ICALP) (Warwick, UK, 2012), pp. 461-472.
-
(2012)
Proc. Int. Conf. Automata, Languages and Programming (ICALP)
, pp. 461-472
-
-
Hsu, J.1
Khanna, S.2
Roth, A.3
-
17
-
-
65249157560
-
The divergence and Bhattacharyya distance measures in signal selection
-
Feb
-
Kailath, T. The divergence and Bhattacharyya distance measures in signal selection. IEEE Trans. Commun. Technol. 15, 1 (Feb. 1967), 52-60.
-
(1967)
IEEE Trans. Commun. Technol
, vol.15
, Issue.1
, pp. 52-60
-
-
Kailath, T.1
-
18
-
-
84937916634
-
Extremal mechanisms for local differential privacy
-
Montreal, Canada, Dec
-
Kairouz, P., Oh, S., and Viswanath, P. Extremal mechanisms for local differential privacy. In Advances Neural Information Processing Systems (NIPS) (Montreal, Canada, Dec. 2014), pp. 2879-2887.
-
(2014)
Advances Neural Information Processing Systems (NIPS)
, pp. 2879-2887
-
-
Kairouz, P.1
Oh, S.2
Viswanath, P.3
-
19
-
-
79960379430
-
What can we learn privately?
-
May
-
Kasiviswanathan, S. P., Lee, H. K., Nissim, K., Raskhodnikova, S., and Smith, A. What can we learn privately? SIAM J. Comput. 40, 3 (May 2011), 793-826.
-
(2011)
SIAM J. Comput
, vol.40
, Issue.3
, pp. 793-826
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
20
-
-
84911185040
-
The data brokers: Selling your personal information
-
Mar
-
Kroft, S. The data brokers: selling your personal information. CBS News (Mar. 2014).
-
(2014)
CBS News
-
-
Kroft, S.1
-
21
-
-
84906569582
-
The value of noise for informational cascades
-
Honolulu, HI
-
Le, T. N., Subramanian, V. G., and Berry, R. A. The value of noise for informational cascades. In Proc. IEEE Int. Symp. Information Theory (ISIT) (Honolulu, HI, 2014), pp. 1101-1105.
-
(2014)
Proc. IEEE Int. Symp. Information Theory (ISIT)
, pp. 1101-1105
-
-
Le, T.N.1
Subramanian, V.G.2
Berry, R.A.3
-
22
-
-
84871390246
-
Take it or leave it: Running a survey when privacy comes at a cost
-
Liverpool, UK
-
Ligett, K., and Roth, A. Take it or leave it: Running a survey when privacy comes at a cost. In Proc. Int. Workshop Internet and Network Economics (WINE) (Liverpool, UK, 2012), pp. 378-391.
-
(2012)
Proc. Int. Workshop Internet and Network Economics (WINE)
, pp. 378-391
-
-
Ligett, K.1
Roth, A.2
-
23
-
-
74549194382
-
Eliciting informative feedback: The peer-prediction method
-
Springer London
-
Miller, N., Resnick, P., and Zeckhauser, R. Eliciting informative feedback: The peer-prediction method. In Computing with Social Trust, Human-Computer Interaction Series. Springer London, 2009, pp. 185-212.
-
(2009)
Computing with Social Trust, Human-Computer Interaction Series
, pp. 185-212
-
-
Miller, N.1
Resnick, P.2
Zeckhauser, R.3
-
24
-
-
84893294860
-
Redrawing the boundaries on purchasing data from privacy-sensitive individuals
-
Princeton, NJ
-
Nissim, K., Vadhan, S., and Xiao, D. Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In Proc. Conf. Innovations in Theoretical Computer Science (ITCS) (Princeton, NJ, 2014), pp. 411-422.
-
(2014)
Proc. Conf. Innovations in Theoretical Computer Science (ITCS)
, pp. 411-422
-
-
Nissim, K.1
Vadhan, S.2
Xiao, D.3
-
25
-
-
84893263337
-
Privacy and mechanism design
-
June
-
Pai, M. M., and Roth, A. Privacy and mechanism design. SIGecom Exch. 12, 1 (June 2013), 8-29.
-
(2013)
SIGecom Exch
, vol.12
, Issue.1
, pp. 8-29
-
-
Pai, M.M.1
Roth, A.2
-
26
-
-
84863535449
-
Conducting truthful surveys, cheaply
-
Valencia, Spain
-
Roth, A., and Schoenebeck, G. Conducting truthful surveys, cheaply. In Proc. ACM Conf. Electronic Commerce (EC) (Valencia, Spain, 2012), pp. 826-843.
-
(2012)
Proc. ACM Conf. Electronic Commerce (EC)
, pp. 826-843
-
-
Roth, A.1
Schoenebeck, G.2
-
27
-
-
84978732885
-
Privacy games: Optimal user-centric data obfuscation
-
Philadelphia, PA
-
Shokri, R. Privacy games: Optimal user-centric data obfuscation. In Proc. Privacy Enhancing Technologies (PETS) (Philadelphia, PA, 2015), pp. 299-315.
-
(2015)
Proc. Privacy Enhancing Technologies (PETS)
, pp. 299-315
-
-
Shokri, R.1
-
28
-
-
84931829819
-
-
Cambridge Univ. Press, New York
-
Srikant, R., and Ying, L. Communication Networks: An Optimization, Control and Stochastic Networks Perspective. Cambridge Univ. Press, New York, 2014.
-
(2014)
Communication Networks: An Optimization, Control and Stochastic Networks Perspective
-
-
Srikant, R.1
Ying, L.2
-
29
-
-
84946690964
-
On the relation between identify ability, differential privacy, and mutual-information privacy
-
Monticello, IL, Sept
-
Wang, W., Ying, L., and Zhang, J. On the relation between identify ability, differential privacy, and mutual-information privacy. In Proc. Ann. Allerton Conf. Communication, Control and Computing (Monticello, IL, Sept. 2014), pp. 1086-1092.
-
(2014)
Proc. Ann. Allerton Conf. Communication, Control and Computing
, pp. 1086-1092
-
-
Wang, W.1
Ying, L.2
Zhang, J.3
-
30
-
-
84978750377
-
A minimax distortion view of differentially private query release
-
Pacific Grove, CA, Nov
-
Wang, W., Ying, L., and Zhang, J. A minimax distortion view of differentially private query release. In Proc. Asilomar Conf. Signals, Systems, and Computers (Pacific Grove, CA, Nov. 2015).
-
(2015)
Proc. Asilomar Conf. Signals, Systems, and Computers
-
-
Wang, W.1
Ying, L.2
Zhang, J.3
-
31
-
-
84978750375
-
-
arXiv:1603.06870, cs.GT
-
Wang, W., Ying, L., and Zhang, J. The value of privacy: Strategic data subjects, incentive mechanisms and fundamental limits. arXiv:1603.06870 [cs.GT] (2016).
-
(2016)
The Value of Privacy: Strategic Data Subjects, Incentive Mechanisms and Fundamental Limits
-
-
Wang, W.1
Ying, L.2
Zhang, J.3
-
32
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Mar
-
Warner, S. L. Randomized response: A survey technique for eliminating evasive answer bias. J. Amer. Stat. Assoc. 60, 309 (Mar. 1965), 63-69.
-
(1965)
J. Amer. Stat. Assoc
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
|