Calibrating Noise to Sensitivity in Private Data Analysis
暂无分享,去创建一个
Cynthia Dwork | Adam D. Smith | Kobbi Nissim | Frank McSherry | C. Dwork | Frank McSherry | Adam D. Smith | Kobbi Nissim
[1] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[2] Dorothy E. Denning,et al. Secure statistical databases with random sample queries , 1980, TODS.
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[5] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[6] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[7] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[9] Eli Ben-Sasson,et al. Some 3CNF properties are hard to test , 2003, STOC '03.
[10] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[11] C. Dwork,et al. On the Utility of Privacy-Preserving Histograms , 2004 .
[12] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.
[13] Hoeteck Wee,et al. Toward Privacy in Public Databases , 2005, TCC.
[14] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[15] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[16] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[17] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[18] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[19] L. Wasserman,et al. A Statistical Framework for Differential Privacy , 2008, 0811.2501.
[20] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[21] A. Blum,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[22] Ashwin Machanavajjhala,et al. Privacy: Theory meets Practice on the Map , 2008, 2008 IEEE 24th International Conference on Data Engineering.