暂无分享,去创建一个
Yin Yang | Marianne Winslett | Xiaokui Xiao | Ganzhao Yuan | Zhenjie Zhang | Zhifeng Hao | Xiaokui Xiao | M. Winslett | Zhenjie Zhang | Y. Yang | Z. Hao | Ganzhao Yuan
[1] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[2] Michael I. Jordan,et al. A Direct Formulation for Sparse Pca Using Semidefinite Programming , 2004, SIAM Rev..
[3] Johannes Gehrke,et al. iReduct: differential privacy with reduced relative errors , 2011, SIGMOD '11.
[4] Ling Huang,et al. Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning , 2009, J. Priv. Confidentiality.
[5] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[6] Andrew McGregor,et al. Optimizing linear counting queries under differential privacy , 2009, PODS.
[7] Kunal Talwar,et al. On the geometry of differential privacy , 2009, STOC '10.
[8] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[9] Divesh Srivastava,et al. Differentially Private Spatial Decompositions , 2011, 2012 IEEE 28th International Conference on Data Engineering.
[10] Yi Ma,et al. The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.
[11] Johannes Gehrke,et al. Differential privacy via wavelet transforms , 2009, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[12] Xianfu Wang. Volumes of Generalized Unit Balls , 2005 .
[13] Marianne Winslett,et al. Differentially private data cubes: optimizing noise sources and consistency , 2011, SIGMOD '11.
[14] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[15] G. Sapiro,et al. A collaborative framework for 3D alignment and classification of heterogeneous subvolumes in cryo-electron tomography. , 2013, Journal of structural biology.
[16] Adam D. Smith,et al. Discovering frequent patterns in sensitive data , 2010, KDD.
[17] José Mario Martínez,et al. Nonmonotone Spectral Projected Gradient Methods on Convex Sets , 1999, SIAM J. Optim..
[18] Aaron Roth,et al. A learning theory approach to noninteractive database privacy , 2011, JACM.
[19] Nicholas I. M. Gould,et al. A globally convergent Lagrangian barrier algorithm for optimization with general inequality constraints and simple bounds , 1997, Math. Comput..
[20] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[21] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[22] Dan Suciu,et al. Boosting the accuracy of differentially private histograms through consistency , 2009, Proc. VLDB Endow..
[23] Anand D. Sarwate,et al. Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..
[24] Yurii Nesterov,et al. Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.
[25] Yoram Singer,et al. Efficient projections onto the l1-ball for learning in high dimensions , 2008, ICML '08.
[26] Ratul Mahajan,et al. Differentially-private network trace analysis , 2010, SIGCOMM '10.
[27] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[28] Yin Yang,et al. Differentially private histogram publication , 2012, The VLDB Journal.
[29] Philip S. Yu,et al. Differentially private data release for data mining , 2011, KDD.
[30] Yin Yang,et al. Compressive mechanism: utilizing sparse representation in differential privacy , 2011, WPES.