A ug 2 01 4 Local Privacy , Data Processing Inequalities , and Minimax Rates
暂无分享,去创建一个
[1] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[2] R. Phelps. Lectures on Choquet's Theorem , 1966 .
[3] D. W. Scott. On optimal and data based histograms , 1979 .
[4] L. Gleser. Estimation in a Multivariate "Errors in Variables" Regression Model: Large Sample Results , 1981 .
[5] P. Assouad. Deux remarques sur l'estimation , 1983 .
[6] Lucien Birgé. Approximation dans les espaces métriques et théorie de l'estimation , 1983 .
[7] P. Brucker. Review of recent development: An O( n) algorithm for quadratic knapsack problems , 1984 .
[8] George T. Duncan,et al. Disclosure-Limited Data Dissemination , 1986 .
[9] P. Hall,et al. Optimal Rates of Convergence for Deconvolving a Density , 1988 .
[10] D. Lambert,et al. The Risk of Disclosure for Microdata , 1989 .
[11] R. Gray. Entropy and Information Theory , 1990, Springer New York.
[12] Noga Alon,et al. The Probabilistic Method , 2015, Fundamentals of Ramsey Theory.
[13] Michael Kearns,et al. Efficient noise-tolerant learning from statistical queries , 1993, STOC.
[14] Bin Yu. Assouad, Fano, and Le Cam , 1997 .
[15] Stephen E. Fienberg,et al. Disclosure limitation using perturbation and related methods for categorical data , 1998 .
[16] Yuhong Yang,et al. Information-theoretic determination of minimax rates of convergence , 1999 .
[17] V. Buldygin,et al. Metric characterization of random variables and random processes , 2000 .
[18] Lianfen Qian,et al. Nonparametric Curve Estimation: Methods, Theory, and Applications , 1999, Technometrics.
[19] Rudolf Ahlswede,et al. Strong converse for identification via quantum channels , 2000, IEEE Trans. Inf. Theory.
[20] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[21] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[22] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[23] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[24] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[25] L. Wasserman,et al. A Statistical Framework for Differential Privacy , 2008, 0811.2501.
[26] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[27] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[28] Andrew W. Roddam,et al. Measurement Error in Nonlinear Models: a Modern Perspective , 2008 .
[29] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[30] Eran Omri,et al. Distributed Private Data Analysis: On Simultaneously Solving How and What , 2008, CRYPTO.
[31] Alexandre B. Tsybakov,et al. Introduction to Nonparametric Estimation , 2008, Springer series in statistics.
[32] Martin J. Wainwright,et al. A unified framework for high-dimensional analysis of $M$-estimators with decomposable regularizers , 2009, NIPS.
[33] Runze Li,et al. Variable Selection for Partially Linear Models With Measurement Errors , 2009, Journal of the American Statistical Association.
[34] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[35] Kunal Talwar,et al. On the geometry of differential privacy , 2009, STOC '10.
[36] Toniann Pitassi,et al. The Limits of Two-Party Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[37] Guy N. Rothblum,et al. A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[38] Stephen E. Fienberg,et al. Differential Privacy and the Risk-Utility Tradeoff for Multi-dimensional Contingency Tables , 2010, Privacy in Statistical Databases.
[39] Runze Li,et al. Variable Selection in Measurement Error Models. , 2010, Bernoulli : official journal of the Bernoulli Society for Mathematical Statistics and Probability.
[40] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[41] Amos Beimel,et al. Bounds on the Sample Complexity for Private Learning and Private Data Release , 2010, TCC.
[42] Po-Ling Loh,et al. High-dimensional regression with noisy and missing data: Provable guarantees with non-convexity , 2011, NIPS.
[43] Adam D. Smith,et al. Privacy-preserving statistical estimation with optimal convergence rates , 2011, STOC '11.
[44] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[45] Ling Huang,et al. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning , 2009, J. Priv. Confidentiality.
[46] Anindya De,et al. Lower Bounds in Differential Privacy , 2011, TCC.
[47] Kamalika Chaudhuri,et al. Convergence Rates for Differentially Private Statistical Estimation , 2012, ICML.
[48] Emmanuel J. Candès,et al. On the Fundamental Limits of Adaptive Sensing , 2011, IEEE Transactions on Information Theory.
[49] Larry A. Wasserman,et al. Random Differential Privacy , 2011, J. Priv. Confidentiality.
[50] Venkat Anantharam,et al. On Maximal Correlation, Hypercontractivity, and the Data Processing Inequality studied by Erkip and Cover , 2013, ArXiv.
[51] Michael I. Jordan,et al. Matrix concentration inequalities via the method of exchangeable pairs , 2012, 1201.6002.
[52] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.