暂无分享,去创建一个
Haim Kaplan | Yishay Mansour | Kobbi Nissim | Uri Stemmer | Y. Mansour | Haim Kaplan | Uri Stemmer | Kobbi Nissim
[1] David P. Woodruff,et al. Reusable low-error compressive sampling schemes through privacy , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).
[2] Haim Kaplan,et al. Adversarially Robust Streaming Algorithms via Differential Privacy , 2020, NeurIPS.
[3] Atri Rudra,et al. Recovering simple signals , 2012, 2012 Information Theory and Applications Workshop.
[4] Jeffrey Scott Vitter,et al. Random sampling with a reservoir , 1985, TOMS.
[5] David P. Woodruff,et al. How robust are linear sketches to adaptive inputs? , 2012, STOC '13.
[6] Ueli Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.
[7] Toniann Pitassi,et al. Generalization in Adaptive Data Analysis and Holdout Reuse , 2015, NIPS.
[8] Tight Bounds for Adversarially Robust Streams and Sliding Windows via Difference Estimators , 2020, 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS).
[9] Sudipto Guha,et al. Graph sketches: sparsification, spanners, and subgraphs , 2012, PODS.
[10] Eylon Yogev,et al. The Adversarial Robustness of Sampling , 2019, IACR Cryptol. ePrint Arch..
[11] Yonatan Aumann,et al. Everlasting security in the bounded storage model , 2002, IEEE Trans. Inf. Theory.
[12] David P. Woodruff,et al. A Framework for Adversarially Robust Streaming Algorithms , 2020, SIGMOD Rec..
[13] Michael O. Rabin,et al. Hyper-Encryption and Everlasting Security , 2002, STACS.
[14] Ueli Maurer,et al. Optimal Randomizer Efficiency in the Bounded-Storage Model , 2003, Journal of Cryptology.
[15] Yonatan Aumann,et al. Information Theoretically Secure Communication in the Limited Storage Space Model , 1999, CRYPTO.
[16] Thomas Steinke,et al. Interactive fingerprinting codes and the hardness of preventing false discovery , 2014, 2016 Information Theory and Applications Workshop (ITA).
[17] Thomas Steinke,et al. The Limits of Post-Selection Generalization , 2018, NeurIPS.
[18] Chi-Jen Lu. Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.
[19] Ueli Maurer,et al. Unconditional Security Against Memory-Bounded Adversaries , 1997, CRYPTO.
[20] Moni Naor,et al. Sketching in adversarial environments , 2008, STOC.
[21] Moni Naor,et al. On Everlasting Security in the Hybrid Bounded Storage Model , 2006, ICALP.
[22] Salil P. Vadhan,et al. Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.
[23] Jonathan Ullman,et al. Preventing False Discovery in Interactive Data Analysis Is Hard , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[24] Sudipto Guha,et al. Analyzing graph structure via linear measurements , 2012, SODA.