-
1
-
-
85030249957
-
Deep learning with differential privacy
-
M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, "Deep learning with differential privacy, " in CCS, 2016.
-
(2016)
CCS
-
-
Abadi, M.1
Chu, A.2
Goodfellow, I.3
McMahan, H.B.4
Mironov, I.5
Talwar, K.6
Zhang, L.7
-
2
-
-
84942309488
-
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
-
G. Ateniese, L. V. Mancini, A. Spognardi, A. Villani, D. Vitali, and G. Felici, "Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers, " International Journal of Security and Networks, vol. 10, no. 3, pp. 137-150, 2015.
-
(2015)
International Journal of Security and Networks
, vol.10
, Issue.3
, pp. 137-150
-
-
Ateniese, G.1
Mancini, L.V.2
Spognardi, A.3
Villani, A.4
Vitali, D.5
Felici, G.6
-
3
-
-
84995370961
-
Membership privacy in MicroRNA-based studies
-
M. Backes, P. Berrang, M. Humbert, and P. Manoharan, "Membership privacy in MicroRNA-based studies, " in CCS, 2016.
-
(2016)
CCS
-
-
Backes, M.1
Berrang, P.2
Humbert, M.3
Manoharan, P.4
-
4
-
-
79957487964
-
Privacypreserving ECG classification with branching programs and neural networks
-
M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, "Privacypreserving ECG classification with branching programs and neural networks, " Trans. Info. Forensics and Security, vol. 6, no. 2, pp. 452-468, 2011.
-
(2011)
Trans. Info. Forensics and Security
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.4
Schneider, T.5
-
5
-
-
84920025979
-
Private empirical risk minimization: Efficient algorithms and tight error bounds
-
R. Bassily, A. Smith, and A. Thakurta, "Private empirical risk minimization: Efficient algorithms and tight error bounds, " in FOCS, 2014.
-
(2014)
FOCS
-
-
Bassily, R.1
Smith, A.2
Thakurta, A.3
-
6
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
J. Bos, K. Lauter, and M. Naehrig, "Private predictive analysis on encrypted medical data, " J. Biomed. Informatics, vol. 50, pp. 234-243, 2014.
-
(2014)
J. Biomed. Informatics
, vol.50
, pp. 234-243
-
-
Bos, J.1
Lauter, K.2
Naehrig, M.3
-
7
-
-
80051990341
-
You might also like: Privacy risks of collaborative filtering
-
J. Calandrino, A. Kilzer, A. Narayanan, E. Felten, and V. Shmatikov, ""You might also like:" Privacy risks of collaborative filtering, " in S&P, 2011.
-
(2011)
S&P
-
-
Calandrino, J.1
Kilzer, A.2
Narayanan, A.3
Felten, E.4
Shmatikov, V.5
-
8
-
-
84858769465
-
Privacy-preserving logistic regression
-
K. Chaudhuri and C. Monteleoni, "Privacy-preserving logistic regression, " in NIPS, 2009.
-
(2009)
NIPS
-
-
Chaudhuri, K.1
Monteleoni, C.2
-
9
-
-
79955858775
-
Differentially private empirical risk minimization
-
K. Chaudhuri, C. Monteleoni, and A. Sarwate, "Differentially private empirical risk minimization, " JMLR, vol. 12, pp. 1069-1109, 2011.
-
(2011)
JMLR
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.3
-
10
-
-
84965174696
-
Differentially private learning of structured discrete distributions
-
I. Diakonikolas, M. Hardt, and L. Schmidt, "Differentially private learning of structured discrete distributions, " in NIPS, 2015.
-
(2015)
NIPS
-
-
Diakonikolas, I.1
Hardt, M.2
Schmidt, L.3
-
11
-
-
33645584057
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
W. Du, Y. Han, and S. Chen, "Privacy-preserving multivariate statistical analysis: Linear regression and classification. " in SDM, 2004.
-
(2004)
SDM
-
-
Du, W.1
Han, Y.2
Chen, S.3
-
13
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis, " in TCC, 2006.
-
(2006)
TCC
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
79959952201
-
On the difficulties of disclosure prevention in statistical databases or the case for differential privacy
-
C. Dwork and M. Naor, "On the difficulties of disclosure prevention in statistical databases or the case for differential privacy, " J. Privacy and Confidentiality, vol. 2, no. 1, pp. 93-107, 2010.
-
(2010)
J. Privacy and Confidentiality
, vol.2
, Issue.1
, pp. 93-107
-
-
Dwork, C.1
Naor, M.2
-
15
-
-
84960325629
-
Robust traceability from trace amounts
-
C. Dwork, A. Smith, T. Steinke, J. Ullman, and S. Vadhan, "Robust traceability from trace amounts, " in FOCS, 2015.
-
(2015)
FOCS
-
-
Dwork, C.1
Smith, A.2
Steinke, T.3
Ullman, J.4
Vadhan, S.5
-
16
-
-
84954097669
-
Model inversion attacks that exploit confidence information and basic countermeasures
-
M. Fredrikson, S. Jha, and T. Ristenpart, "Model inversion attacks that exploit confidence information and basic countermeasures, " in CCS, 2015.
-
(2015)
CCS
-
-
Fredrikson, M.1
Jha, S.2
Ristenpart, T.3
-
17
-
-
85055873696
-
Privacy in pharmacogenetics: An end-to-end case study of personalized Warfarin dosing
-
M. Fredrikson, E. Lantz, S. Jha, S. Lin, D. Page, and T. Ristenpart, "Privacy in pharmacogenetics: An end-to-end case study of personalized Warfarin dosing, " in USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Fredrikson, M.1
Lantz, E.2
Jha, S.3
Lin, S.4
Page, D.5
Ristenpart, T.6
-
18
-
-
84998546946
-
Train faster, generalize better: Stability of stochastic gradient descent
-
M. Hardt, B. Recht, and Y. Singer, "Train faster, generalize better: Stability of stochastic gradient descent, " in ICML, 2016.
-
(2016)
ICML
-
-
Hardt, M.1
Recht, B.2
Singer, Y.3
-
19
-
-
85161148381
-
The elements of statistical learning: Data mining, inference and prediction
-
T. Hastie, R. Tibshirani, J. Friedman, and J. Franklin, "The elements of statistical learning: Data mining, inference and prediction, " The Mathematical Intelligencer, vol. 27, no. 2, pp. 83-85, 2005.
-
(2005)
The Mathematical Intelligencer
, vol.27
, Issue.2
, pp. 83-85
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
Franklin, J.4
-
21
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig, "Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density SNP genotyping microarrays, " PLoS Genetics, vol. 4, no. 8, 2008.
-
(2008)
PLoS Genetics
, vol.4
, Issue.8
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
22
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
G. Jagannathan and R. Wright, "Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, " in KDD, 2005.
-
(2005)
KDD
-
-
Jagannathan, G.1
Wright, R.2
-
23
-
-
84954143278
-
-
arXiv:1503. 02031
-
P. Jain, V. Kulkarni, A. Thakurta, and O. Williams, "To drop or not to drop: Robustness, consistency and differential privacy properties of dropout, " arXiv:1503. 02031, 2015.
-
(2015)
To Drop or Not to Drop: Robustness, Consistency and Differential Privacy Properties of Dropout
-
-
Jain, P.1
Kulkarni, V.2
Thakurta, A.3
Williams, O.4
-
25
-
-
84969785173
-
Differentially private Bayesian optimization
-
M. J. Kusner, J. R. Gardner, R. Garnett, and K. Q. Weinberger, "Differentially private Bayesian optimization, " in ICML, 2015.
-
(2015)
ICML
-
-
Kusner, M.J.1
Gardner, J.R.2
Garnett, R.3
Weinberger, K.Q.4
-
26
-
-
0003625004
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining, " in CRYPTO, 2000.
-
(2000)
CRYPTO
-
-
Lindell, Y.1
Pinkas, B.2
-
28
-
-
84877781092
-
Learning in a large function space: Privacy-preserving mechanisms for SVM learning
-
B. Rubinstein, P. Bartlett, L. Huang, and N. Taft, "Learning in a large function space: Privacy-preserving mechanisms for SVM learning, " J. Privacy and Confidentiality, vol. 4, no. 1, p. 4, 2012.
-
(2012)
J. Privacy and Confidentiality
, vol.4
, Issue.1
, pp. 4
-
-
Rubinstein, B.1
Bartlett, P.2
Huang, L.3
Taft, N.4
-
29
-
-
69349086735
-
Genomic privacy and limits of individual detection in a pool
-
S. Sankararaman, G. Obozinski, M. I. Jordan, and E. Halperin, "Genomic privacy and limits of individual detection in a pool, " Nature Genetics, vol. 41, no. 9, pp. 965-967, 2009.
-
(2009)
Nature Genetics
, vol.41
, Issue.9
, pp. 965-967
-
-
Sankararaman, S.1
Obozinski, G.2
Jordan, M.I.3
Halperin, E.4
-
30
-
-
84954108845
-
Privacy-preserving deep learning
-
R. Shokri and V. Shmatikov, "Privacy-preserving deep learning, " in CCS, 2015.
-
(2015)
CCS
-
-
Shokri, R.1
Shmatikov, V.2
-
31
-
-
84904163933
-
Dropout: A simple way to prevent neural networks from overfitting
-
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, "Dropout: A simple way to prevent neural networks from overfitting, " JMLR, vol. 15, no. 1, pp. 1929-1958, 2014.
-
(2014)
JMLR
, vol.15
, Issue.1
, pp. 1929-1958
-
-
Srivastava, N.1
Hinton, G.2
Krizhevsky, A.3
Sutskever, I.4
Salakhutdinov, R.5
-
32
-
-
85029450982
-
-
USENIX Security
-
F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, "Stealing machine learning models via prediction APIs, " in USENIX Security, 2016.
-
(2016)
Stealing Machine Learning Models Via Prediction APIs
-
-
Tramèr, F.1
Zhang, F.2
Juels, A.3
Reiter, M.K.4
Ristenpart, T.5
-
33
-
-
45749132089
-
Privacy-preserving Naive Bayes classification
-
J. Vaidya, M. Kantarcoglu, and C. Clifton, "Privacy-preserving Naive Bayes classification, " VLDB, vol. 17, no. 4, pp. 879-898, 2008.
-
(2008)
VLDB
, vol.17
, Issue.4
, pp. 879-898
-
-
Vaidya, J.1
Kantarcoglu, M.2
Clifton, C.3
-
35
-
-
84954094289
-
-
arXiv:1412. 6181
-
P. Xie, M. Bilenko, T. Finley, R. Gilad-Bachrach, K. Lauter, and M. Naehrig, "Crypto-nets: Neural networks over encrypted data, " arXiv:1412. 6181, 2014.
-
(2014)
Crypto-nets: Neural Networks over Encrypted Data
-
-
Xie, P.1
Bilenko, M.2
Finley, T.3
Gilad-Bachrach, R.4
Lauter, K.5
Naehrig, M.6
-
36
-
-
84956988054
-
Participatory cultural mapping based on collective behavior data in location-based social networks
-
D. Yang, D. Zhang, and B. Qu, "Participatory cultural mapping based on collective behavior data in location-based social networks, " ACM TIST, vol. 7, no. 3, p. 30, 2016.
-
(2016)
ACM TIST
, vol.7
, Issue.3
, pp. 30
-
-
Yang, D.1
Zhang, D.2
Qu, B.3
-
37
-
-
84873178476
-
Functional mechanism: Regression analysis under differential privacy
-
J. Zhang, Z. Zhang, X. Xiao, Y. Yang, and M. Winslett, "Functional mechanism: Regression analysis under differential privacy, " VLDB, vol. 5, no. 11, pp. 1364-1375, 2012.
-
(2012)
VLDB
, vol.5
, Issue.11
, pp. 1364-1375
-
-
Zhang, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Winslett, M.5
-
38
-
-
0347585601
-
Kernel logistic regression and the import vector machine
-
J. Zhu and T. Hastie, "Kernel logistic regression and the import vector machine, " in NIPS, 2001.
-
(2001)
NIPS
-
-
Zhu, J.1
Hastie, T.2
|