Analysis of networks: privacy in Bayesian networks and problems in lattice models
暂无分享,去创建一个
[1] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[2] Y. Yeh,et al. Dimer problem on the cylinder and torus , 2008 .
[3] R. Balakrishnan. The energy of a graph , 2004 .
[4] Jianguo Qian,et al. Dimer coverings on random multiple chains of planar honeycomb lattices , 2012 .
[5] I. Gutman. The Energy of a Graph: Old and New Results , 2001 .
[6] W. R. Thompson. ON THE LIKELIHOOD THAT ONE UNKNOWN PROBABILITY EXCEEDS ANOTHER IN VIEW OF THE EVIDENCE OF TWO SAMPLES , 1933 .
[7] M. Degroot. Optimal Statistical Decisions , 1970 .
[8] J. Berger. Statistical Decision Theory and Bayesian Analysis , 1988 .
[9] Benjamin C. Pierce,et al. Distance makes the types grow stronger: a calculus for differential privacy , 2010, ICFP '10.
[10] C. Coulson,et al. Hückel theory for organic chemists , 1978 .
[11] J. Propp,et al. Local statistics for random domino tilings of the Aztec diamond , 1996, math/0008243.
[12] Toniann Pitassi,et al. Preserving Statistical Validity in Adaptive Data Analysis , 2014, STOC.
[13] David P. Landau,et al. Phase transitions and critical phenomena , 1989, Computing in Science & Engineering.
[14] Li Xiong,et al. Bayesian inference under differential privacy , 2012, 1203.0617.
[15] Russell Lyons. Asymptotic Enumeration of Spanning Trees , 2005, Comb. Probab. Comput..
[16] Stephen T. Joy. The Differential Privacy of Bayesian Inference , 2015 .
[17] Chris Scullard. Exact site percolation thresholds using a site-to-bond transformation and the star-triangle transformation. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] Steven R. Finch. Several constants arising in statistical mechanics , 1998 .
[19] K Y Szeto,et al. Damage spreading on two-dimensional trivalent structures with Glauber dynamics: hierarchical and random lattices. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[20] Kamalika Chaudhuri,et al. Convergence Rates for Differentially Private Statistical Estimation , 2012, ICML.
[21] Benjamin I. P. Rubinstein,et al. The Bernstein Mechanism: Function Release under Differential Privacy , 2017, AAAI.
[22] Christos Dimitrakakis,et al. On the Leakage of Information in Biometric Authentication , 2014, INDOCRYPT.
[23] James R. Foulds,et al. On the Theory and Practice of Privacy-Preserving Bayesian Data Analysis , 2016, UAI.
[24] Frederick R. Forst,et al. On robust estimation of the location parameter , 1980 .
[25] M. Fisher. Statistical Mechanics of Dimers on a Plane Lattice , 1961 .
[26] G. R. Allen. Dimer models for the antiferroelectric transition in copper formate tetrahydrate , 1974 .
[27] Fuji Zhang,et al. Extremal Polyomino Chains on k-matchings and k-independent Sets , 2007 .
[28] Carolyn Pillers Dobler,et al. Mathematical Statistics , 2002 .
[29] E. Ordentlich,et al. Inequalities for the L1 Deviation of the Empirical Distribution , 2003 .
[30] H. Hosoya. Topological Index. A Newly Proposed Quantity Characterizing the Topological Nature of Structural Isomers of Saturated Hydrocarbons , 1971 .
[31] Giuliana P. Davidoff,et al. Elementary number theory, group theory, and Ramanujan graphs , 2003 .
[32] R. J. Baxter. Planar lattice gases with nearest-neighbor exclusion , 1999 .
[33] Kamalika Chaudhuri,et al. Privacy-preserving logistic regression , 2008, NIPS.
[34] Ashwin Machanavajjhala,et al. A rigorous and customizable framework for privacy , 2012, PODS.
[35] N. Linial,et al. Expander Graphs and their Applications , 2006 .
[36] John Law,et al. Robust Statistics—The Approach Based on Influence Functions , 1986 .
[37] Andreas Haeberlen,et al. Linear dependent types for differential privacy , 2013, POPL.
[38] V. I. Norkin,et al. Stochastic Lipschitz functions , 1986 .
[39] Cynthia Dwork,et al. Differential Privacy for Statistics: What we Know and What we Want to Learn , 2010, J. Priv. Confidentiality.
[40] Xiaogang Liu,et al. Spectra of Subdivision-Vertex Join and Subdivision-Edge Join of Two Graphs , 2012, 1212.0619.
[41] Rebecca N. Wright,et al. A Practical Differentially Private Random Decision Tree Classifier , 2009, 2009 IEEE International Conference on Data Mining Workshops.
[42] D. Klein,et al. Transfer‐Matrix Method for Subgraph Enumeration: Applications to Polypyrene Fusenes , 1986 .
[43] Ling Huang,et al. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning , 2009, J. Priv. Confidentiality.
[44] P. Pearce,et al. A classical theory of hard squares , 1988 .
[45] Moshe Tennenholtz,et al. Approximately optimal mechanism design via differential privacy , 2010, ITCS '12.
[46] Fuji Zhang,et al. On the number of perfect matchings of line graphs , 2013, Discret. Appl. Math..
[47] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[48] Larry A. Wasserman,et al. Random Differential Privacy , 2011, J. Priv. Confidentiality.
[49] S. K. Tsang,et al. Hard-square lattice gas , 1980 .
[50] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[51] R. Merrifield,et al. Topological methods in chemistry , 1989 .
[52] Toniann Pitassi,et al. The Limits of Two-Party Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[53] Toniann Pitassi,et al. The reusable holdout: Preserving validity in adaptive data analysis , 2015, Science.
[54] Weigen Yan,et al. The triangular kagomé lattices revisited , 2013 .
[55] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[56] Lenka Zdeborová,et al. The number of matchings in random graphs , 2006, ArXiv.
[57] Ulrike von Luxburg,et al. Hitting and commute times in large graphs are often misleading , 2010, 1003.1266.
[58] Mário S. Alvim,et al. On the Relation between Differential Privacy and Quantitative Information Flow , 2011, ICALP.
[59] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[60] Andreas Haeberlen,et al. Differential Privacy Under Fire , 2011, USENIX Security Symposium.
[61] André Elisseeff,et al. Stability and Generalization , 2002, J. Mach. Learn. Res..
[62] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[63] Sanchit Maruti,et al. Magnetic properties of the two‐dimensional ‘‘triangles‐in‐triangles’’ Kagomé lattice Cu9X2(cpa)6 (X=F,Cl,Br) , 1994 .
[64] A. Dawid,et al. Game theory, maximum entropy, minimum discrepancy and robust Bayesian decision theory , 2004, math/0410076.
[65] Shiva Prasad Kasiviswanathan,et al. On the 'Semantics' of Differential Privacy: A Bayesian Formulation , 2008, J. Priv. Confidentiality.
[66] Fuji Zhang,et al. Double hexagonal chains with maximal Hosoya index and minimal Merrifield–Simmons index , 2007 .
[67] Stephan G. Wagner,et al. On the number of spanning trees on various lattices , 2010 .
[68] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[69] Bojan Mohar,et al. The Quasi-Wiener and the Kirchhoff Indices Coincide , 1996, J. Chem. Inf. Comput. Sci..
[70] Mário S. Alvim,et al. Differential Privacy: On the Trade-Off between Utility and Information Leakage , 2011, Formal Aspects in Security and Trust.
[71] Yin Yang,et al. Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..
[72] Klein,et al. Exact enumeration of long-range-ordered dimer coverings on the square-planar lattice. , 1990, Physical review. B, Condensed matter.
[73] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[74] M. .. Moore. Exactly Solved Models in Statistical Mechanics , 1983 .
[75] Fuji Zhang,et al. Clique-inserted-graphs and spectral dynamics of clique-inserting , 2009 .
[76] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[77] Jianguo Qian,et al. Monomer-dimer problem on random planar honeycomb lattice , 2014 .
[78] Fabio Roli,et al. Machine Learning Methods for Computer Security (Dagstuhl Perspectives Workshop 12371) , 2012, Dagstuhl Reports.
[79] F. Y. Wu,et al. Spanning trees on graphs and lattices in d dimensions , 2000, cond-mat/0004341.
[80] Zuhe Zhang. Merrifield-Simmons Index and Its Entropy of the 4-8-8 Lattice , 2014 .
[81] Ashwin Machanavajjhala,et al. Privacy: Theory meets Practice on the Map , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[82] S. J. Cyvin,et al. Kekule Structures in Benzenoid Hydrocarbons , 1988 .
[83] Anand D. Sarwate,et al. Near-optimal Differentially Private Principal Components , 2012, NIPS.
[84] R. Fowler,et al. An attempt to extend the statistical theory of perfect solutions , 1937 .
[85] Catuscia Palamidessi,et al. Quantitative Notions of Leakage for One-try Attacks , 2009, MFPS.
[86] L. Pauling. The Nature Of The Chemical Bond , 1939 .
[87] Y. Loh,et al. Dimers on the triangular kagome lattice , 2008, 0803.0742.
[88] Xiaogang Liu,et al. Spectra of the neighbourhood corona of two graphs , 2012, 1209.5906.
[89] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[90] L. Wasserman,et al. A Statistical Framework for Differential Privacy , 2008, 0811.2501.
[91] Frank McSherry,et al. Probabilistic Inference and Differential Privacy , 2010, NIPS.
[92] I. Gutman. Extremal hexagonal chains , 1993 .
[93] Dimers on two-dimensional lattices , 2003, cond-mat/0303251.
[94] F Y Wu. New critical frontiers for the potts and percolation models. , 2006, Physical review letters.
[95] Gilles Barthe,et al. Programming language techniques for differential privacy , 2016, SIGL.
[96] Peter Grünwald,et al. The Safe Bayesian - Learning the Learning Rate via the Mixability Gap , 2012, ALT.
[97] M. Fisher,et al. Dimer problem in statistical mechanics-an exact result , 1961 .
[98] Feng Tian,et al. Extremal Catacondensed Benzenoids , 2003 .
[99] I. Gutman,et al. Mathematical Concepts in Organic Chemistry , 1986 .
[100] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[101] Zuhe Zhang,et al. Some physical and chemical indices of clique-inserted lattices , 2013, 1302.5932.
[102] Jonathan Katz,et al. Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[103] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[104] Benny Sudakov,et al. On the probability of independent sets in random graphs , 2003, Random Struct. Algorithms.
[105] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[106] S. Salinas,et al. Theory of the phase transition in the layered hydrogen-bonded SnCl2· 2H2O crystal , 1974 .
[107] Alexander J. Smola,et al. Privacy for Free: Posterior Sampling and Stochastic Gradient Monte Carlo , 2015, ICML.
[108] Catherine S. Greenhill,et al. On the Number of Spanning Trees in Random Regular Graphs , 2014, Electron. J. Comb..
[109] Kunal Talwar,et al. On the geometry of differential privacy , 2009, STOC '10.
[110] Christos Dimitrakakis,et al. Differential Privacy for Bayesian Inference through Posterior Sampling , 2017, J. Mach. Learn. Res..
[111] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[112] van Aernout Enter. Statistical Mechanics, A Short Treatise , 2000 .
[113] L. Lecam. Convergence of Estimates Under Dimensionality Restrictions , 1973 .
[114] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[115] Herbert S. Wilf,et al. The Number of Independent Sets in a Grid Graph , 1998, SIAM J. Discret. Math..
[116] Ratul Mahajan,et al. Differentially-private network trace analysis , 2010, SIGCOMM 2010.
[117] Christos Dimitrakakis,et al. Robust and Private Bayesian Inference , 2013, ALT.
[118] Yeong-Nan Yeh,et al. The asymptotic behavior of some indices of iterated line graphs of regular graphs , 2012, Discret. Appl. Math..
[119] Benjamin Van Roy,et al. (More) Efficient Reinforcement Learning via Posterior Sampling , 2013, NIPS.
[120] M. H. Schultz,et al. Topological properties of hypercubes , 1988, IEEE Trans. Computers.
[121] Larry A. Wasserman,et al. Differential privacy for functions and functional data , 2012, J. Mach. Learn. Res..
[122] Catuscia Palamidessi,et al. Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems , 2012, QAPL.
[123] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[124] Pramod Viswanath,et al. The Composition Theorem for Differential Privacy , 2013, IEEE Transactions on Information Theory.
[125] Weigen Yan,et al. Asymptotic energy of lattices , 2008, 0810.0801.
[126] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[127] B. Ripley,et al. Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.
[128] Darakhshan J. Mir. Differentially-private learning and information theory , 2012, EDBT-ICDT '12.
[129] Elaine Shi,et al. GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.
[130] Peter Harremoës,et al. Refinements of Pinsker's inequality , 2003, IEEE Trans. Inf. Theory.