A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy
暂无分享,去创建一个
[1] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[2] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[3] K. Brown,et al. Graduate Texts in Mathematics , 1982 .
[4] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[5] Ashwin Machanavajjhala,et al. Design of Policy-Aware Differentially Private Algorithms , 2015, Proc. VLDB Endow..
[6] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[7] Benjamin I. P. Rubinstein,et al. Pain-Free Random Differential Privacy with Sensitivity Sampling , 2017, ICML.
[8] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[9] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[10] Aleksandar Nikolov,et al. The geometry of differential privacy: the sparse and approximate cases , 2012, STOC '13.
[11] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Guy N. Rothblum,et al. Concentrated Differential Privacy , 2016, ArXiv.
[13] Ashwin Machanavajjhala,et al. Pufferfish , 2014, ACM Trans. Database Syst..
[14] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[15] Divesh Srivastava,et al. Differentially Private Spatial Decompositions , 2011, 2012 IEEE 28th International Conference on Data Engineering.
[16] Larry A. Wasserman,et al. Random Differential Privacy , 2011, J. Priv. Confidentiality.
[17] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[18] Ilya Mironov,et al. On significance of the least significant bits for differential privacy , 2012, CCS.
[19] Mário S. Alvim,et al. Quantitative Information Flow and Applications to Differential Privacy , 2011, FOSAD.
[20] Mário S. Alvim,et al. On the information leakage of differentially-private mechanisms , 2015, J. Comput. Secur..
[21] Sudeep Kamath,et al. An Operational Approach to Information Leakage , 2018, IEEE Transactions on Information Theory.
[22] Gilles Barthe,et al. Information-Theoretic Bounds for Differentially Private Mechanisms , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[23] Mário S. Alvim,et al. Differential Privacy: On the Trade-Off between Utility and Information Leakage , 2011, Formal Aspects in Security and Trust.
[24] Martin Hofmann. Foundations of Software Science and Computational Structures , 2011, Lecture Notes in Computer Science.
[25] Catuscia Palamidessi,et al. Quantitative Notions of Leakage for One-try Attacks , 2009, MFPS.
[26] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.