Search Results

1 - 10 of 55 items :

  • "differential privacy" x
Clear All

. Castelluccia, and R. Chen. Differentially private histogram publishing through lossy compression. In 2012 IEEE 12th International Conference on Data Mining , pages 1–10. IEEE, 2012. [5] G. Amjad, S. Kamara, and T. Moataz. Breach-resistant structured encryption. IACR Cryptology ePrint Archive , 2018:195, 2018. [6] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security , pages 901–914. ACM, 2013. [7

References [1] “CoverUp Measurement Data,” http://e.mohammadi.eu/paper/coverup_measurements.zip , 2018, [Online]. [2] M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep Learning with Differential Privacy,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS) . ACM, 2016, pp. 308–318. [3] M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1st ed. New York: Dover, 1972. [4] B. Balle, G. Barthe, and M. Gaboardi

://github.com/DPSelectro/DPSelect . [11] Cynthia Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation , pages 1–19. Springer, 2008. [12] Cynthia Dwork, Aaron Roth, et al. The Algorithmic Foundations of Differential Privacy. Foundations and Trends® in Theoretical Computer Science , 9(3–4):211–407, 2014. [13] Matthew Edman and Paul Syverson. AS-Awareness in Tor path selection. In Proceedings of the 16th ACM conference on Computer and communications security , pages 380–389. ACM, 2009. [14] Tariq Elahi, Kevin Bauer, Mashael

-indistinguishability: Differential privacy for location-based systems. In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS’13), pp 901-914 [5] Bao Y, Ullah A (2007) The second-order bias and mean squared error of estimators in time-series models. Journal of Econometrics 140(2):650-669 [6] Bordenabe NE, Chatzikokolakis K, Palamidessi C (2014) Optimal geo-indistinguishable mechanisms for location privacy. In: Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS’14), pp 251-262 [7] Chatzikokolakis K, ElSalamouny E, Palamidessi C

References [1] A. Agresti. Categorical Data Analysis. Wiley Series in Probability and Statistics. Wiley-Interscience, 2nd edition, 2002. [2] Alexa. The top 500 sites on the web. http://www.alexa.com/topsites. [3] Jane R Bambauer, Krish Muralidhar, and Rathindra Sarathy. Fool’s gold: an illustrated critique of differential privacy. 2013. [4] Raef Bassily and Adam Smith. Local, private, efficient protocols for succinct histograms. In STOC. ACM, June 2015, to appear. [5] T-H Hubert Chan, Mingfei Li, Elaine Shi, and Wenchang Xu. Differentially private continual

References [1] Detection, decision, and hypothesis testing. http://web.mit.edu/gallager/www/papers/chap3.pdf . [2] David R Anderson, Kenneth P Burnham, and William L Thompson. Null hypothesis testing: problems, prevalence, and an alternative. The journal of wildlife management , pages 912–923, 2000. [3] Miguel E Andrés, Nicolás E Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Geoindistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security

Berger. Statistical Inference . Brooks/Cole, Belmont, CA, 2 edition, 2002. [5] D. R. Cox. Theoretical statistics . Chapman and Hall, London, 1974. [6] Bolin Ding, Harsha Nori, Paul Li, and Joshua Allen. Comparing population means under local differential privacy: with significance and power. arXiv preprint arXiv:1803.09027 , 2018. [7] Vito D’Orazio, James Honaker, and Gary King. Differential privacy for social science inference. 2015. [8] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In TCC

. ACM, 1517–1520. [16] Marianne Durand and Philippe Flajolet. 2003. Loglog counting of large cardinalities. In European Symposium on Algorithms . Springer, 605–617. [17] Cynthia Dwork. 2008. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation . Springer, 1–19. [18] Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference . Springer, 265–284. [19] Cynthia Dwork, Guy N Rothblum, and Salil

1 This work was partially supported by the European Union 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS. References [1] https://github.com/paracetamolo/elastic-mechanism . [2] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013. [3] C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Location privacy protection through obfuscation

Fourteenth ACM Conference on Electronic Commerce , EC ‘13, pages 215–232, New York, NY, USA, 2013. ACM. [4] E. H. Clarke. Multipart pricing of public goods. Public Choice , 11(1):17–33, 1971. [5] P. Dandekar, N. Fawaz, and S. Ioannidis. Privacy auctions for inner product disclosures. CoRR , abs/1111.2885, 2011. [6] C. Dwork and J. Lei. Differential privacy and robust statistics. In Proceedings of the 41st annual ACM symposium on Theory of computing , pages 371–380. ACM, 2009. [7] C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private