-
1
-
-
84995455042
-
-
Aol search log. http://www.gregsadetsky.com/aol-data/.
-
-
-
Aol search log1
-
3
-
-
84958771236
-
Local, private, efficient protocols for succinct histograms
-
R. Bassily and A. D. Smith. Local, private, efficient protocols for succinct histograms. In STOC, pages 127-135, 2015.
-
(2015)
STOC
, pp. 127-135
-
-
Bassily, R.1
Smith, A.D.2
-
4
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering frequent patterns in sensitive data. In SIGKDD, pages 503-512, 2010.
-
(2010)
SIGKDD
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
5
-
-
84877909042
-
A learning theory approach to noninteractive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to noninteractive database privacy. JACM, 60(2):12, 2013.
-
(2013)
JACM
, vol.60
, Issue.2
, pp. 12
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
6
-
-
31844446958
-
Learning to rank using gradient descent
-
C. Burges et al. Learning to rank using gradient descent. In ICML, pages 89-96, 2005.
-
(2005)
ICML
, pp. 89-96
-
-
Burges, C.1
-
7
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen et al. Publishing set-valued data via differential privacy. PVLDB, 4(11):1087-1098, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
-
9
-
-
84893480068
-
Local privacy and statistical minimax rates
-
J. C. Duchi, M. I. Jordan, and M. J. Wainwright. Local privacy and statistical minimax rates. In FOCS, pages 429-438, 2013.
-
(2013)
FOCS
, pp. 429-438
-
-
Duchi, J.C.1
Jordan, M.I.2
Wainwright, M.J.3
-
11
-
-
79960173817
-
Pan-private streaming algorithms
-
C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In ICS, pages 66-80, 2010.
-
(2010)
ICS
, pp. 66-80
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
Yekhanin, S.5
-
12
-
-
84910685712
-
Rappor: Randomized aggregatable privacy-preserving ordinal response
-
U. Erlingsson et al. Rappor: Randomized aggregatable privacy-preserving ordinal response. In CCS, pages 1054-1067, 2014.
-
(2014)
CCS
, pp. 1054-1067
-
-
Erlingsson, U.1
-
13
-
-
85017396913
-
Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries
-
G. Fanti et al. Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries. PoPETS, issue 3, 2016, 2016.
-
(2016)
PoPETS
, Issue.3
, pp. 2016
-
-
Fanti, G.1
-
14
-
-
84884919465
-
Privately releasing conjunctions and the statistical query barrier
-
A. Gupta, M. Hardt, A. Roth, and J. Ullman. Privately releasing conjunctions and the statistical query barrier. SICOMP, 42(4):1494-1520, 2013.
-
(2013)
SICOMP
, vol.42
, Issue.4
, pp. 1494-1520
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
15
-
-
41849097852
-
Aol removes search data on vast group of web users
-
S. Hansell. Aol removes search data on vast group of web users. New York Times, 8:C4, 2006.
-
(2006)
New York Times
, vol.8 C4
-
-
Hansell, S.1
-
16
-
-
77954711905
-
On the geometry of differential privacy
-
M. Hardt and K. Talwar. On the geometry of differential privacy. In STOC, pages 705-714, 2010.
-
(2010)
STOC
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
17
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay et al. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1-2):1021-1032, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1-2
, pp. 1021-1032
-
-
Hay, M.1
-
18
-
-
84904352532
-
Blowfish privacy: Tuning privacy-utility trade-offs using policies
-
X. He, A. Machanavajjhala, and B. Ding. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In SIGMOD, pages 1447-1458, 2014.
-
(2014)
SIGMOD
, pp. 1447-1458
-
-
He, X.1
Machanavajjhala, A.2
Ding, B.3
-
19
-
-
84883765200
-
Distributed private heavy hitters
-
J. Hsu, S. Khanna, and A. Roth. Distributed private heavy hitters. In Automata, Languages, and Programming, pages 461-472. 2012.
-
(2012)
Automata, Languages, and Programming
, pp. 461-472
-
-
Hsu, J.1
Khanna, S.2
Roth, A.3
-
20
-
-
84875294645
-
Extensions of lipschitz mappings into a hilbert space
-
W. B. Johnson and J. Lindenstrauss. Extensions of lipschitz mappings into a hilbert space. Contemporary mathematics, 26(189-206):1, 1984.
-
(1984)
Contemporary Mathematics
, vol.26
, Issue.189-206
, pp. 1
-
-
Johnson, W.B.1
Lindenstrauss, J.2
-
21
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
-
D. Karger et al. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In STOC, pages 654-663, 1997.
-
(1997)
STOC
, pp. 654-663
-
-
Karger, D.1
-
22
-
-
79960379430
-
What can we learn privately?
-
S. P. Kasiviswanathan et al. What can we learn privately? SICOMP, 40(3):793-826, 2011.
-
(2011)
SICOMP
, vol.40
, Issue.3
, pp. 793-826
-
-
Kasiviswanathan, S.P.1
-
23
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
C. Li et al. Optimizing linear counting queries under differential privacy. In PODS, pages 123-134, 2010.
-
(2010)
PODS
, pp. 123-134
-
-
Li, C.1
-
24
-
-
84958249500
-
Differentially private histogram publication for dynamic datasets: An adaptive sampling approach
-
H. Li et al. Differentially private histogram publication for dynamic datasets: an adaptive sampling approach. In CIKM, pages 1001-1010, 2015.
-
(2015)
CIKM
, pp. 1001-1010
-
-
Li, H.1
-
25
-
-
84872862536
-
Privbasis: Frequent itemset mining with differential privacy
-
N. Li, W. Qardaji, D. Su, and J. Cao. Privbasis: Frequent itemset mining with differential privacy. PVLDB, 5(11):1340-1351, 2012.
-
(2012)
PVLDB
, vol.5
, Issue.11
, pp. 1340-1351
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
26
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD, pages 19-30, 2009.
-
(2009)
SIGMOD
, pp. 19-30
-
-
McSherry, F.D.1
-
28
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the ASA, 60(309):63-69, 1965.
-
(1965)
Journal of the ASA
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
29
-
-
77956224773
-
Optimal random perturbation at multiple privacy levels
-
X. Xiao, Y. Tao, and M. Chen. Optimal random perturbation at multiple privacy levels. PVLDB, 2(1):814-825, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 814-825
-
-
Xiao, X.1
Tao, Y.2
Chen, M.3
-
30
-
-
79959540412
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. TKDE, 23(8):1200-1214, 2011.
-
(2011)
TKDE
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
31
-
-
84888050192
-
Differentially private histogram publication
-
J. Xu et al. Differentially private histogram publication. VLDBJ, 22(6):797-822, 2013.
-
(2013)
VLDBJ
, vol.22
, Issue.6
, pp. 797-822
-
-
Xu, J.1
|