暂无分享,去创建一个
[1] J. Bourgain,et al. Invertibility of ‘large’ submatrices with applications to the geometry of Banach spaces and harmonic analysis , 1987 .
[2] Tim Roughgarden,et al. Interactive privacy via the median mechanism , 2009, STOC '10.
[3] A. Lewis. The Convex Analysis of Unitarily Invariant Matrix Functions , 1995 .
[4] Adam D. Smith,et al. The price of privately releasing contingency tables and the spectra of random matrices with correlated rows , 2010, STOC '10.
[5] Moni Naor,et al. Differential privacy under continual observation , 2010, STOC '10.
[6] Moni Naor,et al. On the complexity of differentially private data release: efficient algorithms and hardness results , 2009, STOC '09.
[7] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[8] Jonathan Ullman,et al. Answering n{2+o(1)} counting queries with differential privacy is hard , 2012, STOC '13.
[9] Aleksandar Nikolov,et al. Approximating Hereditary Discrepancy via Small Width Ellipsoids , 2013, SODA.
[10] Elaine Shi,et al. Private and Continual Release of Statistics , 2010, ICALP.
[11] Aleksandar Nikolov,et al. Using Convex Relaxations for Efficiently and Privately Releasing Marginals , 2014, SoCG.
[12] D. Spielman,et al. An elementary proof of the restricted invertibility theorem , 2009, 0911.1114.
[13] Michael L. Overton,et al. Optimality conditions and duality theory for minimizing sums of the largest eigenvalues of symmetric matrices , 2015, Math. Program..
[14] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[15] Aleksandar Nikolov,et al. Optimal private halfspace counting via discrepancy , 2012, STOC '12.
[16] Katrina Ligett,et al. A Simple and Practical Algorithm for Differentially Private Data Release , 2010, NIPS.
[17] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[18] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[19] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[20] R. Tyrrell Rockafellar,et al. Convex Analysis , 1970, Princeton Landmarks in Mathematics and Physics.
[21] K. Fan. On a Theorem of Weyl Concerning Eigenvalues of Linear Transformations I. , 1949, Proceedings of the National Academy of Sciences of the United States of America.
[22] Aaron Roth,et al. Privately Releasing Conjunctions and the Statistical Query Barrier , 2013, SIAM J. Comput..
[23] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[24] Aleksandar Nikolov,et al. The geometry of differential privacy: the sparse and approximate cases , 2012, STOC '13.
[25] Aaron Roth,et al. Iterative Constructions and Private Data Release , 2011, TCC.
[26] Li Zhang,et al. Nearly optimal minimax estimator for high-dimensional sparse linear regression , 2012, 1206.6536.
[27] Aaron Roth,et al. A learning theory approach to noninteractive database privacy , 2011, JACM.
[28] Aleksandar Nikolov. Randomized Rounding for the Largest Simplex Problem , 2015, STOC.
[29] K. Fan. On a Theorem of Weyl Concerning Eigenvalues of Linear Transformations: II. , 1949, Proceedings of the National Academy of Sciences of the United States of America.
[30] Martin Grötschel,et al. The ellipsoid method and its consequences in combinatorial optimization , 1981, Comb..
[31] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[32] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[33] Guy N. Rothblum,et al. A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[34] Alexander Schrijver,et al. Combinatorial optimization. Polyhedra and efficiency. , 2003 .