暂无分享,去创建一个
[1] Joan Feigenbaum,et al. Secure Multiparty Computation of Approximations , 2001, ICALP.
[2] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[3] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[4] William E. Winkler,et al. Multiplicative Noise for Masking Continuous Data , 2001 .
[5] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[6] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[7] Leslie G. Valiant,et al. A theory of the learnable , 1984, STOC '84.
[8] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[9] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[10] L. Wasserman,et al. A Statistical Framework for Differential Privacy , 2008, 0811.2501.
[11] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[12] Gideon S. Mann,et al. Distributed Training Strategies for the Structured Perceptron , 2010, NAACL.
[13] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[14] Alexander J. Smola,et al. Scaling Distributed Machine Learning with the Parameter Server , 2014, OSDI.
[15] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[16] Eric Bauer,et al. An Empirical Comparison of Voting Classification Algorithms: Bagging, Boosting, and Variants , 1999, Machine Learning.
[17] Shai Shalev-Shwartz,et al. Online learning: theory, algorithms and applications (למידה מקוונת.) , 2007 .
[18] Nathan Srebro,et al. Fast Rates for Regularized Objectives , 2008, NIPS.
[19] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[20] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[21] Yu-Hong Dai,et al. A perfect example for the BFGS method , 2013, Math. Program..
[22] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[23] Alexander J. Smola,et al. Bundle Methods for Regularized Risk Minimization , 2010, J. Mach. Learn. Res..
[24] Michael Collins,et al. Discriminative Training Methods for Hidden Markov Models: Theory and Experiments with Perceptron Algorithms , 2002, EMNLP.
[25] Nathan Srebro,et al. SVM optimization: inverse dependence on training set size , 2008, ICML '08.
[26] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[27] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[28] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[29] Larry A. Wasserman,et al. Differential privacy with compression , 2009, 2009 IEEE International Symposium on Information Theory.
[30] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[31] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[32] John N. Tsitsiklis,et al. Parallel and distributed computation , 1989 .
[33] Peter Chilstrom. Singular Value Inequalities: New Approaches to Conjectures , 2013 .
[34] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[35] Aaron Roth,et al. Differentially Private Approximation Algorithms , 2009, ArXiv.
[36] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[37] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[38] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[39] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[40] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[41] Vitaly Shmatikov,et al. How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.
[42] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[43] Michael I. Jordan,et al. A General Analysis of the Convergence of ADMM , 2015, ICML.
[44] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[45] Glenn Fung,et al. Privacy-preserving classification of vertically partitioned data via random kernels , 2008, TKDD.
[46] Qing Ling,et al. On the Linear Convergence of the ADMM in Decentralized Consensus Optimization , 2013, IEEE Transactions on Signal Processing.
[47] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[48] Georgios B. Giannakis,et al. Consensus-Based Distributed Support Vector Machines , 2010, J. Mach. Learn. Res..