-
1
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis, " in TCC, 2006, pp. 265-284.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
2
-
-
84960325629
-
Robust traceability from trace amounts
-
C. Dwork, A. D. Smith, T. Steinke, J. Ullman, and S. P. Vadhan, "Robust traceability from trace amounts, " in IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, 2015, pp. 650-669.
-
(2015)
IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015
, pp. 650-669
-
-
Dwork, C.1
Smith, A.D.2
Steinke, T.3
Ullman, J.4
Vadhan, S.P.5
-
3
-
-
84873964793
-
The limits of two-party differential privacy
-
A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. P. Vadhan, "The limits of two-party differential privacy, " Electronic Colloquium on Computational Complexity (ECCC), vol. 18, p. 106, 2011.
-
(2011)
Electronic Colloquium on Computational Complexity (ECCC
, vol.18
, pp. 106
-
-
McGregor, A.1
Mironov, I.2
Pitassi, T.3
Reingold, O.4
Talwar, K.5
Vadhan, S.P.6
-
4
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim, "Revealing information while preserving privacy, " in Proceedings of the Twenty-Second ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems, June 9-12, 2003, San Diego, CA, USA, 2003, pp. 202-210.
-
(2003)
Proceedings of the Twenty-Second ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems June 9-12, 2003, San Diego, CA, USA
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
5
-
-
84876061488
-
The power of linear reconstruction attacks
-
S. P. Kasiviswanathan, M. Rudelson, and A. Smith, "The power of linear reconstruction attacks, " in Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New Orleans, Louisiana, USA, January 6-8, 2013, 2013, pp. 1415-1433.
-
(2013)
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2013, New Orleans, Louisiana, USA, January 6-8, 2013
, pp. 1415-1433
-
-
Kasiviswanathan, S.P.1
Rudelson, M.2
Smith, A.3
-
6
-
-
85055873696
-
Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing
-
M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart, "Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing, " in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014, pp. 17-32.
-
(2014)
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22 2014
, pp. 17-32
-
-
Fredrikson, M.1
Lantz, E.2
Jha, S.3
Lin, S.4
Page, D.5
Ristenpart, T.6
-
8
-
-
84877885891
-
Image reconstruction based on local feature descriptors
-
M. Daneshi and J. Guo, "Image reconstruction based on local feature descriptors, " Dept. Elect. Eng., Stanford Univ., Stanford, CA, USA, Tech. Rep, 2011.
-
(2011)
Dept. Elect. Eng., Stanford Univ., Stanford, CA, USA, Tech. Rep
-
-
Daneshi, M.1
Guo, J.2
-
9
-
-
84985901891
-
From bits to images: Inversion of local binary descriptors
-
vol. abs/1211.1265
-
E. d'Angelo, L. Jacques, A. Alahi, and P. Vandergheynst, "From bits to images: Inversion of local binary descriptors, " CoRR, vol. abs/1211.1265, 2012.
-
(2012)
CoRR
-
-
D'Angelo, E.1
Jacques, L.2
Alahi, A.3
Vandergheynst, P.4
-
10
-
-
84911401824
-
Image reconstruction from bag-ofvisual-words
-
H. Kato and T. Harada, "Image reconstruction from bag-ofvisual-words, " in 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014, 2014, pp. 955-962.
-
(2014)
2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014
, pp. 955-962
-
-
Kato, H.1
Harada, T.2
-
12
-
-
0040098263
-
Some bounds on multiparty communication complexity of pointer jumping
-
C. Damm, S. Jukna, and J. Sgall, "Some bounds on multiparty communication complexity of pointer jumping, " Computational Complexity, vol. 7, no. 2, pp. 109-127, 1998.
-
(1998)
Computational Complexity
, vol.7
, Issue.2
, pp. 109-127
-
-
Damm, C.1
Jukna, S.2
Sgall, J.3
-
13
-
-
34748917183
-
Lower bounds for multi-player pointer jumping
-
A. Chakrabarti, "Lower bounds for multi-player pointer jumping, " in 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 13-16 June 2007, San Diego, California, USA, 2007, pp. 33-45.
-
(2007)
22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 13-16 June 2007, San Diego, California, USA
, pp. 33-45
-
-
Chakrabarti, A.1
-
14
-
-
84902110944
-
Tight bounds for set disjointness in the message passing model
-
vol. abs/1305.4696
-
M. Braverman, F. Ellen, R. Oshman, T. Pitassi, and V. Vaikuntanathan, "Tight bounds for set disjointness in the message passing model, " CoRR, vol. abs/1305.4696, 2013.
-
(2013)
CoRR
-
-
Braverman, M.1
Ellen, F.2
Oshman, R.3
Pitassi, T.4
Vaikuntanathan, V.5
-
15
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. J. Fischer, N. A. Lynch, and M. Paterson, "Impossibility of distributed consensus with one faulty process, " J. ACM, vol. 32, no. 2, pp. 374-382, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.J.1
Lynch, N.A.2
Paterson, M.3
-
16
-
-
0034516311
-
Randomized rumor spreading
-
R. M. Karp, C. Schindelhauer, S. Shenker, and B. Vöcking, "Randomized rumor spreading, " in 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, 2000, pp. 565-574.
-
(2000)
41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA
, pp. 565-574
-
-
Karp, R.M.1
Schindelhauer, C.2
Shenker, S.3
Vöcking, B.4
-
17
-
-
0344118858
-
Gossip-based computation of aggregate information
-
D. Kempe, A. Dobra, and J. Gehrke, "Gossip-based computation of aggregate information, " in 44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings, 2003, pp. 482-491.
-
(2003)
44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings
, pp. 482-491
-
-
Kempe, D.1
Dobra, A.2
Gehrke, J.3
-
18
-
-
84920155983
-
Space pseudorandom generators by communication complexity lower bounds
-
A. Ganor and R. Raz, "Space pseudorandom generators by communication complexity lower bounds, " in Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2014, September 4-6, 2014, Barcelona, Spain, 2014, pp. 692-703.
-
(2014)
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2014, September 4-6, 2014, Barcelona, Spain
, pp. 692-703
-
-
Ganor, A.1
Raz, R.2
-
21
-
-
84878348015
-
Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution
-
Y. Huang, J. Katz, and D. Evans, "Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution, " in IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA, 2012, pp. 272-284.
-
(2012)
IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA
, pp. 272-284
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
22
-
-
84870691494
-
Approximating the influence of monotone boolean functions in o(n) query complexity
-
D. Ron, R. Rubinfeld, M. Safra, A. Samorodnitsky, and O. Weinstein, "Approximating the influence of monotone boolean functions in o(n) query complexity, " TOCT, vol. 4, no. 4, p. 11, 2012.
-
(2012)
TOCT
, vol.4
, Issue.4
, pp. 11
-
-
Ron, D.1
Rubinfeld, R.2
Safra, M.3
Samorodnitsky, A.4
Weinstein, O.5
|