-
1
-
-
0036811662
-
k-Anonymity: a model for protecting privacy
-
L. Sweeney, "k-Anonymity: a model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
2
-
-
34248181923
-
l-Diversity: privacy beyond k-anonymity
-
article no. 3
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "l-Diversity: privacy beyond k-anonymity," ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article no. 3, 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
3
-
-
34548805858
-
t-Closeness: privacy beyond k-anonymity and l-diversity
-
Istanbul, Turkey
-
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: privacy beyond k-anonymity and l-diversity," in Proceedings of the IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey, 2007, pp. 106-115.
-
(2007)
in Proceedings of the IEEE 23rd International Conference on Data Engineering
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
4
-
-
77951201056
-
Privacypreserving data publishing: a survey of recent developments
-
article no. 14
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacypreserving data publishing: a survey of recent developments," ACM Computing Surveys, vol. 42, no. 4, article no. 14, 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
5
-
-
78650804208
-
A firm foundation for private data analysis
-
C. Dwork, "A firm foundation for private data analysis," Communications of the ACM, vol. 54, no. 1, pp. 86-95, 2011.
-
(2011)
Communications of the ACM
, vol.54
, Issue.1
, pp. 86-95
-
-
Dwork, C.1
-
6
-
-
33746037200
-
Our data, ourselves: privacy via distributed noise generation
-
Saint Petersburg, Russia
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, "Our data, ourselves: privacy via distributed noise generation," in Proceedings of the 24th Annual International Conference on The Theory and Applications of Cryptographic Techniques, Saint Petersburg, Russia, 2006, pp. 486-503.
-
(2006)
in Proceedings of the 24th Annual International Conference on The Theory and Applications of Cryptographic Techniques
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
7
-
-
33746335051
-
Differential privacy
-
Heidelberg: Springer
-
C. Dwork, "Differential privacy," Automata, Languages and Programming, Lecture Notes in Computer Science vol. 4052, M. Bugliesi et al., editors, Heidelberg: Springer, pp. 1-12, 2006.
-
(2006)
Automata, Languages and Programming, Lecture Notes in Computer Science vol. 4052, M. Bugliesi et al., editors
, pp. 1-12
-
-
Dwork, C.1
-
8
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
San Diego, CA
-
K. Nissim, S. Raskhodnikova, and A. Smith, "Smooth sensitivity and sampling in private data analysis," in Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, CA, 2007, pp. 75-84.
-
(2007)
in Proceedings of the 39th Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
9
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. Fung, B. C. Desai, and L. Xiong, "Publishing set-valued data via differential privacy," Proceedings of the VLDB Endowment, vol. 4, no. 11, pp. 1087-1098, 2011.
-
(2011)
Proceedings of the VLDB Endowment
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.3
Desai, B.C.4
Xiong, L.5
-
10
-
-
84872862536
-
PrivBasis: frequent itemset mining with differential privacy
-
N. Li, W. Qardaji, D. Su, and J. Cao, "PrivBasis: frequent itemset mining with differential privacy," Proceedings of the VLDB Endowment, vol. 5, no. 11, pp. 1340-1351, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1340-1351
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
11
-
-
46749128577
-
Mechanism design via differential privacy
-
Providence, RI
-
F. McSherry and K. Talwar, "Mechanism design via differential privacy," in Proceedings of the 48th Annual IEEESymposium on Foundations of Computer Science, Providence, RI, 2007, pp. 94-103.
-
(2007)
in Proceedings of the 48th Annual IEEESymposium on Foundations of Computer Science
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
12
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
New York, NY
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proceedings of the 3rd Conference on Theory of Cryptography, New York, NY, 2006, pp. 265-284.
-
(2006)
in Proceedings of the 3rd Conference on Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
Victoria, BC
-
A. Blum, K. Ligett, and A. Roth, "A learning theory approach to non-interactive database privacy," in Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, BC, 2008, pp. 609-618.
-
(2008)
in Proceedings of the 40th Annual ACM Symposium on Theory of Computing
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
15
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
Washington, DC
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta, "Discovering frequent patterns in sensitive data," in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, 2010, pp. 503-512.
-
(2010)
in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
16
-
-
77956195013
-
Data mining with differential privacy
-
Washington, DC
-
A. Friedman and A. Schuster, "Data mining with differential privacy," in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, 2010, pp. 493-502.
-
(2010)
in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
17
-
-
80052663001
-
Differentially private data release for data mining
-
San Diego, CA
-
N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu, "Differentially private data release for data mining," in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, 2011, pp. 493-501.
-
(2011)
in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
18
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
Indianapolis, IN
-
V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in Proceedings of the ACM SIGMOD International Conference on Management of Data, Indianapolis, IN, 2010, pp. 735-746.
-
(2010)
in Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
19
-
-
84874070246
-
Differentially private histogram publishing through lossy compression
-
Brussels, Belgium
-
G. Acs, C. Castelluccia, and R. Chen, "Differentially private histogram publishing through lossy compression," in Proceedings of the IEEE 12th International Conference on Data Mining, Brussels, Belgium, 2012.
-
(2012)
in Proceedings of the IEEE 12th International Conference on Data Mining
-
-
Acs, G.1
Castelluccia, C.2
Chen, R.3
-
20
-
-
70350683770
-
Universally utility-maximizing privacy mechanisms
-
Bethesda, MD
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utility-maximizing privacy mechanisms," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, 2009, pp. 351-360.
-
(2009)
in Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 351-360
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
21
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
Las Vegas, NV
-
S. R. Ganta, S. P. Kasiviswanathan, and A. Smith, "Composition attacks and auxiliary information in data privacy," in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, NV, 2008, pp. 265-273.
-
(2008)
in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
23
-
-
84864197091
-
Differentially private spatial decompositions
-
Washington, DC
-
G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu, "Differentially private spatial decompositions," in Proceedings of the 28th IEEE International Conference on Data Engineering, Washington, DC, 2012, pp. 20-31.
-
(2012)
in Proceedings of the 28th IEEE International Conference on Data Engineering
, pp. 20-31
-
-
Cormode, G.1
Procopiuc, C.2
Srivastava, D.3
Shen, E.4
Yu, T.5
-
24
-
-
84869393316
-
Differentially private sequential data publication via variable-length n-grams
-
Raleigh, NC
-
R. Chen, G. Acs, and C. Castelluccia, "Differentially private sequential data publication via variable-length n-grams," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 638-649.
-
(2012)
in Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 638-649
-
-
Chen, R.1
Acs, G.2
Castelluccia, C.3
-
25
-
-
79959540412
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke, "Differential privacy via wavelet transforms," IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 8, pp. 1200-1214, 2011.
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
26
-
-
84863906129
-
Differentially private summaries for sparse data
-
Berlin, Germany
-
G. Cormode, C. Procopiuc, D. Srivastava, and T. T. Tran, "Differentially private summaries for sparse data," in Proceedings of the 15th International Conference on Database Theory, Berlin, Germany, 2012, pp. 299-311.
-
(2012)
in Proceedings of the 15th International Conference on Database Theory
, pp. 299-311
-
-
Cormode, G.1
Procopiuc, C.2
Srivastava, D.3
Tran, T.T.4
-
27
-
-
84867501801
-
-
Cornell University, Ithaca, NY, arXiv: 1012.4763
-
M. Hardt, K. Ligett, and F. McSherry, "A simple and practical algorithm for differentially private data release," Cornell University, Ithaca, NY, arXiv: 1012.4763, 2010.
-
(2010)
A simple and practical algorithm for differentially private data release
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
28
-
-
1142275486
-
Revealing information while preserving privacy
-
San Diego, CA
-
I. Dinur and K. Nissim, "Revealing information while preserving privacy," in Proceedings of the 22nd ACM SIGMOD- SIGACT-SIGART Symposium on Principles of Database Systems, San Diego, CA, 2003, pp. 202-210.
-
(2003)
in Proceedings of the 22nd ACM SIGMOD- SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
29
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Cambridge, MA
-
A. Roth and T. Roughgarden, "Interactive privacy via the median mechanism," in Proceedings of the 42nd ACM Symposium on Theory of Computing, Cambridge, MA, 2010, pp. 765-774.
-
(2010)
in Proceedings of the 42nd ACM Symposium on Theory of Computing
, pp. 765-774
-
-
Roth, A.1
Roughgarden, T.2
-
30
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Las Vegas, NV
-
M. Hardt and G. N. Rothblum, "A multiplicative weights mechanism for privacy-preserving data analysis," in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science, Las Vegas, NV, 2010, pp. 61-70.
-
(2010)
in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science
, pp. 61-70
-
-
Hardt, M.1
Rothblum, G.N.2
-
31
-
-
0001024505
-
On the uniform convergence of relative frequencies of events to their probabilities
-
V. N. Vapnik and A. Y. Chervonenkis, "On the uniform convergence of relative frequencies of events to their probabilities," Theory of Probability & Its Applications, vol. 16, no. 2, pp. 264-280, 1971.
-
(1971)
Theory of Probability & Its Applications
, vol.16
, Issue.2
, pp. 264-280
-
-
Vapnik, V.N.1
Chervonenkis, A.Y.2
-
32
-
-
70350689921
-
On the complexity of differentially private data release: efficient algorithms and hardness results
-
Bethesda, MD
-
C. Dwork, M. Naor, O. Reingold, G. N. Rothblum, and S. Vadhan, "On the complexity of differentially private data release: efficient algorithms and hardness results," in Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD, 2009, pp. 381-390.
-
(2009)
in Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 381-390
-
-
Dwork, C.1
Naor, M.2
Reingold, O.3
Rothblum, G.N.4
Vadhan, S.5
-
33
-
-
33244468835
-
Practical privacy: the SuLQ framework
-
Baltimore, MD
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim, "Practical privacy: the SuLQ framework," in Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Baltimore, MD, 2005, pp. 128-138.
-
(2005)
in Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
34
-
-
24144487020
-
Toward privacy in public databases
-
Cambridge, MA
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, "Toward privacy in public databases," in Proceedings of the 2nd International Conference on Theory of Cryptography, Cambridge, MA, 2005, pp. 363-385.
-
(2005)
in Proceedings of the 2nd International Conference on Theory of Cryptography
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
35
-
-
35448955720
-
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
-
Beijing, China
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar, "Privacy, accuracy, and consistency too: a holistic solution to contingency table release," in Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Beijing, China, 2007, pp. 273-282.
-
(2007)
in Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
36
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," Proceedings of the VLDB Endowment, vol. 3, no. 1- 2, pp. 1021-1032, 2010.
-
(2010)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1-2
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
37
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
Miami, FL
-
M. Hay, C. Li, G. Miklau, and D. Jensen, "Accurate estimation of the degree distribution of private networks," in Proceedings of the 9th IEEE International Conference on Data Mining, Miami, FL, 2009, pp. 169-178.
-
(2009)
in Proceedings of the 9th IEEE International Conference on Data Mining
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
38
-
-
77954715960
-
Optimizing linear counting queries under differential privacy
-
Indianapolis, IN
-
C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor, "Optimizing linear counting queries under differential privacy," in Proceedings of the 29th ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems, Indianapolis, IN, 2010, pp. 123-134.
-
(2010)
in Proceedings of the 29th ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems
, pp. 123-134
-
-
Li, C.1
Hay, M.2
Rastogi, V.3
Miklau, G.4
McGregor, A.5
-
39
-
-
84863733988
-
An adaptive mechanism for accurate query answering under differential privacy
-
C. Li and G. Miklau, "An adaptive mechanism for accurate query answering under differential privacy," Proceedings ofthe VLDB Endowment, vol. 5, no. 6, pp. 514-525, 2012.
-
(2012)
Proceedings ofthe VLDB Endowment
, vol.5
, Issue.6
, pp. 514-525
-
-
Li, C.1
Miklau, G.2
-
40
-
-
84872862526
-
Low-rank mechanism: optimizing batch queries under differential privacy
-
G. Yuan, Z. Zhang, M. Winslett, X. Xiao, Y. Yang, and Z. Hao, "Low-rank mechanism: optimizing batch queries under differential privacy," Proceedings of the VLDB Endowment, vol. 5, no. 11, pp. 1352-1363, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1352-1363
-
-
Yuan, G.1
Zhang, Z.2
Winslett, M.3
Xiao, X.4
Yang, Y.5
Hao, Z.6
-
41
-
-
77954711905
-
On the geometry of differential privacy
-
Cambridge, MA
-
M. Hardt and K. Talwar, "On the geometry of differential privacy," in Proceedings of the 42nd ACM Symposium on Theory of Computing, Cambridge, MA, 2010, pp. 705-714.
-
(2010)
in Proceedings of the 42nd ACM Symposium on Theory of Computing
, pp. 705-714
-
-
Hardt, M.1
Talwar, K.2
-
42
-
-
84862590720
-
Unconditional differentially private mechanisms for linear queries
-
New York, NY
-
A. Bhaskara, D. Dadush, R. Krishnaswamy, and K. Talwar, "Unconditional differentially private mechanisms for linear queries," in Proceedings of the 44th Symposium on Theory of Computing, New York, NY, 2012, pp. 1269-1284.
-
(2012)
in Proceedings of the 44th Symposium on Theory of Computing
, pp. 1269-1284
-
-
Bhaskara, A.1
Dadush, D.2
Krishnaswamy, R.3
Talwar, K.4
-
43
-
-
84899099709
-
DPtree: indexing multi-dimensional data under differential privacy
-
Scottsdale, AZ
-
S. Peng, Y. Yang, Z. Zhang, M. Winslett, and Y. Yu, "DPtree: indexing multi-dimensional data under differential privacy," in Proceedings of the ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, 2012, pp. 864-864.
-
(2012)
in Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 864-864
-
-
Peng, S.1
Yang, Y.2
Zhang, Z.3
Winslett, M.4
Yu, Y.5
-
44
-
-
84861119869
-
Large margin Gaussian mixture models with differential privacy
-
M. A. Pathak and B. Raj, "Large margin Gaussian mixture models with differential privacy," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 4, pp. 463- 469, 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.4
-
-
Pathak, M.A.1
Raj, B.2
-
45
-
-
84873178476
-
Functional mechanism: regression analysis under differential privacy
-
J. Zhang, Z. Zhang, X. Xiao, Y. Yang, and M. Winslett, "Functional mechanism: regression analysis under differential privacy," Proceedings of the VLDB Endowment, vol. 5, no. 11, pp. 1364-1375, 2012.
-
(2012)
Proceedings of the VLDB Endowment
, vol.5
, Issue.11
, pp. 1364-1375
-
-
Zhang, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Winslett, M.5
-
46
-
-
70449464977
-
Differential privacy with compression
-
Seoul, Korea
-
S. Zhou, K. Ligett, and L. Wasserman, "Differential privacy with compression," in Proceedings of the IEEE International Conference on Symposium on Information Theory, Seoul, Korea, 2009, pp. 2718-2722.
-
(2009)
in Proceedings of the IEEE International Conference on Symposium on Information Theory
, pp. 2718-2722
-
-
Zhou, S.1
Ligett, K.2
Wasserman, L.3
-
47
-
-
84877730447
-
Near-optimal differentially private principal components
-
Granada, Spain
-
K. Chaudhuri, A. D. Sarwate, and K. Sinha, "Near-optimal differentially private principal components," in Proceedings of the 25th Annual Conference on Neural Information Processing Systems, Granada, Spain, 2011, pp. 998-1006.
-
(2011)
in Proceedings of the 25th Annual Conference on Neural Information Processing Systems
, pp. 998-1006
-
-
Chaudhuri, K.1
Sarwate, A.D.2
Sinha, K.3
-
48
-
-
70350625977
-
-
Cornell University, Ithaca, NY, arXiv: 0809.4794
-
A. Smith, "Efficient, differentially private point estimators," Cornell University, Ithaca, NY, arXiv: 0809.4794, 2008.
-
(2008)
Efficient, differentially private point estimators
-
-
Smith, A.1
-
50
-
-
80955145156
-
-
Cornell University, Ithaca, NY, arXiv: 0911.5708
-
B. I. P. Rubinstein, P. L. Bartlett, L. Huang, and N. Taft, "Learning in a large function space: privacy-preserving mechanisms for SVM learning," Cornell University, Ithaca, NY, arXiv: 0911.5708, 2009.
-
(2009)
Learning in a large function space: privacy-preserving mechanisms for SVM learning
-
-
Rubinstein, B.I.P.1
Bartlett, P.L.2
Huang, L.3
Taft, N.4
-
51
-
-
78751522594
-
Boosting and differential privacy
-
Las Vegas, NV
-
C. Dwork, G. N. Rothblum, and S. Vadhan, "Boosting and differential privacy," in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science, Las Vegas, NV, 2010, pp. 51-60.
-
(2010)
in Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science
, pp. 51-60
-
-
Dwork, C.1
Rothblum, G.N.2
Vadhan, S.3
-
53
-
-
70350678967
-
Differentially private recommender systems: building privacy into the net
-
Paris, France
-
F. McSherry and I. Mironov, "Differentially private recommender systems: building privacy into the net," in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 627-636.
-
(2009)
in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
54
-
-
85015649873
-
Airavat: security and privacy for MapReduce
-
San Jose, CA
-
I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel, "Airavat: security and privacy for MapReduce," in Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, San Jose, CA, 2010, pp. 20-20.
-
(2010)
in Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation
, pp. 20-20
-
-
Roy, I.1
Setty, S.T.V.2
Kilzer, A.3
Shmatikov, V.4
Witchel, E.5
-
55
-
-
84862658503
-
GUPT: privacy preserving data analysis made easy
-
Scottsdale, AZ
-
P. Mohan, A. Thakurta, E. Shi, D. Song, and D. Culler, "GUPT: privacy preserving data analysis made easy," in Proceedings of the ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, 2012, pp. 349-360.
-
(2012)
in Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 349-360
-
-
Mohan, P.1
Thakurta, A.2
Shi, E.3
Song, D.4
Culler, D.5
-
56
-
-
84855245645
-
Private and continual release of statistics
-
article no. 26
-
T. H. Chan, E. Shi, and D. Song, "Private and continual release of statistics," ACM Transactions on Information and System Security, vo. 14, no. 3, article no. 26, 2011.
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.3
-
-
Chan, T.H.1
Shi, E.2
Song, D.3
-
57
-
-
79960173817
-
Pan-private streaming algorithms
-
Beijing, China
-
C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin, "Pan-private streaming algorithms," in Proceedings of the 1st Symposium on Innovations in Computer Science, Beijing, China, 2010, pp. 66-80.
-
(2010)
in Proceedings of the 1st Symposium on Innovations in Computer Science
, pp. 66-80
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
Yekhanin, S.5
-
58
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
Santa Barbara, CA
-
C. Dwork and S. Yekhanin, "New efficient attacks on statistical disclosure control mechanisms," in Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology, Santa Barbara, CA, 2008, pp. 469-480.
-
(2008)
in Proceedings of the 28th Annual Conference on Cryptology: Advances in Cryptology
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
59
-
-
84878681166
-
Ask a better question, get a better answer a new approach to private data analysis
-
Barcelona, Spain
-
C. Dwork, "Ask a better question, get a better answer a new approach to private data analysis," in Proceedings of the 11th International Conference on Database Theory, Barcelona, Spain, 2007, pp. 18-27.
-
(2007)
in Proceedings of the 11th International Conference on Database Theory
, pp. 18-27
-
-
Dwork, C.1
-
60
-
-
85076486849
-
Differential privacy under fire
-
San Francisco, CA
-
A. Haeberlen, B. C. Pierce, and A. Narayan, "Differential privacy under fire," in Proceedings of the 20th USENIX Conference on Security, San Francisco, CA, 2011.
-
(2011)
in Proceedings of the 20th USENIX Conference on Security
-
-
Haeberlen, A.1
Pierce, B.C.2
Narayan, A.3
-
61
-
-
79959983519
-
No free lunch in data privacy
-
Athens, Greece
-
D. Kifer and A. Machanavajjhala, "No free lunch in data privacy," in Proceedings of the ACM SIGMOD International Conference on Management of Data, Athens, Greece, 2011, pp. 193-204.
-
(2011)
in Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
|