-
1
-
-
84873384215
-
Differentially private data analysis of social networks via restricted sensitivity
-
J. Blocki, A. Blum, A. Datta, and O. Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 87-96, 2013.
-
(2013)
Proceedings of the 4th Conference on Innovations in Theoretical Computer Science
, pp. 87-96
-
-
Blocki, J.1
Blum, A.2
Datta, A.3
Sheffet, O.4
-
2
-
-
84884918157
-
Broadening the scope of differential privacy using metrics
-
K. Chatzikokolakis, M. E. Andr'es, N. E. Bordenabe, and C. Palamidessi. Broadening the scope of differential privacy using metrics. In Privacy Enhancing Technologies, pages 82-102, 2013.
-
(2013)
Privacy Enhancing Technologies
, pp. 82-102
-
-
Chatzikokolakis, K.1
Andr'es, M.E.2
Bordenabe, N.E.3
Palamidessi, C.4
-
3
-
-
84864197091
-
Differentially private spatial decompositions
-
G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu. Differentially private spatial decompositions. In ICDE, pages 20-31, 2012.
-
(2012)
ICDE
, pp. 20-31
-
-
Cormode, G.1
Procopiuc, C.2
Srivastava, D.3
Shen, E.4
Yu, T.5
-
5
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. Advances in Cryptology-EUROCRYPT, pages 486-503, 2006.
-
(2006)
Advances in Cryptology-EUROCRYPT
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
6
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. Theory of Cryptography, pages 265-284, 2006.
-
(2006)
Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
7
-
-
77954717626
-
Differential privacy under continual observation
-
C. Dwork, M. Naor, T. Pitassi, and G. Rothblum. Differential privacy under continual observation. Proceedings of the 42nd ACM symposium on Theory of computing, pages 715-724, 2010.
-
(2010)
Proceedings of the 42nd ACM Symposium on Theory of Computing
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.4
-
8
-
-
79960173817
-
Pan-private streaming algorithms
-
C. Dwork, M. Naor, T. Pitassi, G. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Proceedings of ICS, 2010.
-
(2010)
Proceedings of ICS
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.4
Yekhanin, S.5
-
9
-
-
84864247729
-
Adaptive differentially private histogram of low-dimensional data
-
C. Fang and E. C. Chang. Adaptive differentially private histogram of low-dimensional data. Privacy Enhancing Technologies, pages 160-179, 2012.
-
(2012)
Privacy Enhancing Technologies
, pp. 160-179
-
-
Fang, C.1
Chang, E.C.2
-
10
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, K. Wang, R. Chen, and P. Yu. Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys, pages 14-57, 2010.
-
(2010)
ACM Computing Surveys
, pp. 14-57
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
11
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. VLDB Endowment, pages 1021-1032, 2010.
-
(2010)
VLDB Endowment
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
13
-
-
78649517787
-
An agent-based approach to care in independent living
-
B. Kaluža, V. Mirchevska, E. Dovgan, M. Luštrek, and M. Gams. An agent-based approach to care in independent living. Ambient Intelligence, pages 177-186, 2010.
-
(2010)
Ambient Intelligence
, pp. 177-186
-
-
Kaluža, B.1
Mirchevska, V.2
Dovgan, E.3
Luštrek, M.4
Gams, M.5
-
15
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor. Optimizing linear counting queries under differential privacy. ACM symposium on Principles of database systems of data, pages 123-134, 2010.
-
(2010)
ACM Symposium on Principles of Database Systems of Data
, pp. 123-134
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
16
-
-
33749607006
-
ℓ-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. ℓ-diversity: Privacy beyond k-anonymity. International Conference on Data Engineering, pages 24-36, 2006.
-
(2006)
International Conference on Data Engineering
, pp. 24-36
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
17
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. International Conference on Data Engineering, pages 277-286, 2008.
-
(2008)
International Conference on Data Engineering
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.3
Gehrke, J.4
Vilhuber, L.5
-
20
-
-
0035517699
-
Protecting respondents identities in microdata release
-
P. Samarati. Protecting respondents identities in microdata release. Knowledge and Data Engineering, pages 1010-1027, 2001.
-
(2001)
Knowledge and Data Engineering
, pp. 1010-1027
-
-
Samarati, P.1
-
22
-
-
0033295027
-
Sdpt3 a la matlab software package for semidefinite programming version 1.3
-
K. Toh, M. Todd, and R. Tütüncü. Sdpt3, a la matlab software package for semidefinite programming, version 1.3. Optimization Methods and Software, pages 545-581, 1999.
-
(1999)
Optimization Methods and Software
, pp. 545-581
-
-
Toh, K.1
Todd, M.2
Tütüncü, R.3
-
23
-
-
3142743708
-
Solving semidefinite-quadratic-linear programs using sdpt3
-
R. Tütüncü, K. Toh, and M. Todd. Solving semidefinite-quadratic-linear programs using sdpt3. Mathematical programming, pages 189-217, 2003.
-
(2003)
Mathematical Programming
, pp. 189-217
-
-
Tütüncü, R.1
Toh, K.2
Todd, M.3
-
25
-
-
84864195481
-
Differentially private histogram publication
-
J. Xu, Z. Zhang, X. Xiao, Y. Yang, and G. Yu. Differentially private histogram publication. International Conference on Data Engineering, pages 32-43, 2012.
-
(2012)
International Conference on Data Engineering
, pp. 32-43
-
-
Xu, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Yu, G.5
|