The Differential Privacy Frontier (Extended Abstract)
暂无分享,去创建一个
[1] M. H. Quenouille. NOTES ON BIAS IN ESTIMATION , 1956 .
[2] J. Tukey. A Smooth Invertibility Theorem , 1958 .
[3] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.
[4] Peter J. Huber,et al. Robust Statistics , 2005, Wiley Series in Probability and Statistics.
[5] Werner A. Stahel,et al. Robust Statistics: The Approach Based on Influence Functions , 1987 .
[6] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[7] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[8] Matthew Franklin,et al. Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.
[9] B. Ripley,et al. Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.
[10] J. Heitzig. THE “JACKKNIFE” METHOD: CONFIDENTIALITY PROTECTION FOR COMPLEX STATISTICAL ANALYSES , 2005 .
[11] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[12] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[13] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[14] Cynthia Dwork,et al. The price of privacy and the limits of LP decoding , 2007, STOC '07.
[15] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[16] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[17] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[18] Madhur Tulsiani,et al. Dense Subsets of Pseudorandom Sets , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[19] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[20] Sofya Raskhodnikova,et al. What Can We Learn Privately? , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[21] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[22] Cynthia Dwork,et al. New Efficient Attacks on Statistical Disclosure Control Mechanisms , 2008, CRYPTO.
[23] Haim Kaplan,et al. Private coresets , 2009, STOC '09.
[24] Tim Roughgarden,et al. Universally utility-maximizing privacy mechanisms , 2008, STOC '09.
[25] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[26] Aaron Roth,et al. Differentially Private Approximation Algorithms , 2009, ArXiv.
[27] Omer Reingold,et al. Computational Differential Privacy , 2009, CRYPTO.
[28] Moni Naor,et al. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy , 2010, J. Priv. Confidentiality.