暂无分享,去创建一个
Danfeng Zhang | Daniel Kifer | Yuxin Wang | Ding Ding | Guanhong Wang | Daniel Kifer | Danfeng Zhang | Yuxin Wang | Guanhong Wang | Ding Ding
[1] Andreas Haeberlen,et al. Linear dependent types for differential privacy , 2013, POPL.
[2] Elaine Shi,et al. GUPT: privacy preserving data analysis made easy , 2012, SIGMOD Conference.
[3] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[4] Ashwin Machanavajjhala,et al. On the Privacy Properties of Variants on the Sparse Vector Technique , 2015, ArXiv.
[5] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2016, J. Priv. Confidentiality.
[6] Matthew B. Dwyer,et al. Differential symbolic execution , 2008, SIGSOFT '08/FSE-16.
[7] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[8] Gilles Barthe,et al. Probabilistic Relational Reasoning for Differential Privacy , 2012, TOPL.
[9] Benjamin C. Pierce,et al. Distance makes the types grow stronger: a calculus for differential privacy , 2010, ICFP '10.
[10] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[11] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[12] George Danezis,et al. Verified Computational Differential Privacy with Applications to Smart Metering , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[13] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[14] Aws Albarghouthi,et al. Synthesizing coupling proofs of differential privacy , 2017, Proc. ACM Program. Lang..
[15] Gilles Barthe,et al. Proving Differential Privacy in Hoare Logic , 2014, 2014 IEEE 27th Computer Security Foundations Symposium.
[16] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[17] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[18] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[19] Benjamin Grégoire,et al. Proving Differential Privacy via Probabilistic Couplings , 2016, 2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS).
[20] Dave Clarke,et al. Noninterference via Symbolic Execution , 2012, FMOODS/FORTE.
[21] Dilsun Kirli Kaynar,et al. Formal Verification of Differential Privacy for Interactive Systems , 2011, ArXiv.
[22] David Sands,et al. Differential Privacy , 2015, POPL.
[23] Huimin Lin,et al. Metrics for Differential Privacy in Concurrent Systems , 2014, FORTE.
[24] Moni Naor,et al. On the complexity of differentially private data release: efficient algorithms and hardness results , 2009, STOC '09.
[25] Gilles Barthe,et al. Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs , 2013, ICALP.
[26] Yu Zhang,et al. Differentially Private High-Dimensional Data Publication via Sampling-Based Inference , 2015, KDD.
[27] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[28] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[29] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[30] Chris Clifton,et al. Top-k frequent itemsets via differentially private FP-trees , 2014, KDD.
[31] Ashwin Machanavajjhala,et al. Differentially Private Algorithms for Empirical Machine Learning , 2014, ArXiv.
[32] Ninghui Li,et al. Understanding the Sparse Vector Technique for Differential Privacy , 2016, Proc. VLDB Endow..
[33] Thomas Steinke,et al. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds , 2016, TCC.
[34] Pierre-Yves Strub,et al. Advanced Probabilistic Couplings for Differential Privacy , 2016, CCS.