暂无分享,去创建一个
Úlfar Erlingsson | Ilya Mironov | Shuang Song | Kunal Talwar | Vitaly Feldman | Abhradeep Thakurta | Ananth Raghunathan | Kunal Talwar | V. Feldman | Abhradeep Thakurta | Ú. Erlingsson | Ilya Mironov | A. Raghunathan | Shuang Song
[1] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[2] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[3] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Thomas Steinke,et al. Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds , 2016, TCC.
[6] Somesh Jha,et al. Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting , 2017, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).
[7] Gilles Barthe,et al. Privacy Amplification by Subsampling: Tight Analyses via Couplings and Divergences , 2018, NeurIPS.
[8] Nickolai Zeldovich,et al. Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis , 2018, OSDI.
[9] Frank McSherry,et al. Probabilistic Inference and Differential Privacy , 2010, NIPS.
[10] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[11] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Adam D. Smith,et al. Distributed Differential Privacy via Shuffling , 2018, IACR Cryptol. ePrint Arch..
[14] Borja Balle,et al. Differentially Private Summation with Multi-Message Shuffling , 2019, ArXiv.
[15] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[16] Srinivas Devadas,et al. Atom: Horizontally Scaling Strong Anonymity , 2016, SOSP.
[17] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[18] Adam D. Smith,et al. Distributed Differential Privacy via Mixnets , 2018, ArXiv.
[19] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[20] Salil P. Vadhan,et al. The Complexity of Differential Privacy , 2017, Tutorials on the Foundations of Cryptography.
[21] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[22] Roxana Geambasu,et al. Privacy accounting and quality control in the sage differentially private ML platform , 2019, SOSP.
[23] Úlfar Erlingsson,et al. Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity , 2018, SODA.
[24] Jun Tang,et al. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.
[25] Borja Balle,et al. The Privacy Blanket of the Shuffle Model , 2019, CRYPTO.
[26] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[27] R. Hardwarsing. Stochastic Gradient Descent with Differentially Private Updates , 2018 .
[28] Dan Boneh,et al. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics , 2017, NSDI.
[29] David Evans,et al. Evaluating Differentially Private Machine Learning in Practice , 2019, USENIX Security Symposium.
[30] Ohad Shamir,et al. Stochastic Gradient Descent for Non-smooth Optimization: Convergence Results and Optimal Averaging Schemes , 2012, ICML.
[31] Martin J. Wainwright,et al. Minimax Optimal Procedures for Locally Private Estimation , 2016, ArXiv.
[32] Raef Bassily,et al. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds , 2014, 1405.7085.
[33] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[34] Shuang Song,et al. Making the Shoe Fit: Architectures, Initializations, and Tuning for Learning with Privacy , 2019 .
[35] Raef Bassily,et al. Private Stochastic Convex Optimization with Optimal Rates , 2019, NeurIPS.
[36] Úlfar Erlingsson,et al. That which we call private , 2019, ArXiv.
[37] Christian Ledig,et al. Photo-Realistic Single Image Super-Resolution Using a Generative Adversarial Network , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[38] Badih Ghazi,et al. Private Heavy Hitters and Range Queries in the Shuffled Model , 2019, ArXiv.
[39] Graham Cormode,et al. An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.
[40] Raef Bassily,et al. Local, Private, Efficient Protocols for Succinct Histograms , 2015, STOC.
[41] Andreas Haeberlen,et al. Honeycrisp: large-scale differentially private aggregation without a trusted core , 2019, SOSP.
[42] Li Zhang,et al. Learning Differentially Private Language Models Without Losing Accuracy , 2017, ArXiv.
[43] Adam D. Smith,et al. Is Interaction Necessary for Distributed Private Learning? , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[44] Raef Bassily,et al. Practical Locally Private Heavy Hitters , 2017, NIPS.
[45] Úlfar Erlingsson,et al. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries , 2015, Proc. Priv. Enhancing Technol..
[46] Uri Stemmer,et al. Heavy Hitters and the Structure of Local Privacy , 2017, PODS.
[47] Learning with Privacy at Scale Differential , 2017 .