The following pages link to Theory of Cryptography (Q5898359):
Displaying 50 items.
- The optimal upper bound of the number of queries for Laplace mechanism under differential privacy (Q2224923) (← links)
- A smart privacy-preserving learning method by fake gradients to protect users items in recommender systems (Q2228145) (← links)
- Coupled relational symbolic execution for differential privacy (Q2233459) (← links)
- Differential privacy of hierarchical Census data: an optimization approach (Q2238578) (← links)
- Bounds on the sample complexity for private learning and private data release (Q2251471) (← links)
- Resilient consensus for multi-agent systems subject to differential privacy requirements (Q2280733) (← links)
- Achieving differential privacy of trajectory data publishing in participatory sensing (Q2293161) (← links)
- A differential privacy framework for collaborative filtering (Q2298067) (← links)
- Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms (Q2306022) (← links)
- Tight lower bound of sparse covariance matrix estimation in the local differential privacy model (Q2310743) (← links)
- Optimal locally private estimation under \(\ell_p\) loss for \(1\le p\le 2\) (Q2326993) (← links)
- Exact MCMC with differentially private moves. Exact MCMC with differentially private moves, revisiting the penalty algorithm in a data privacy framework (Q2329811) (← links)
- Statistical active learning algorithms for noise tolerance and differential privacy (Q2345952) (← links)
- Selling privacy at auction (Q2347786) (← links)
- Efficient algorithms for privately releasing marginals via convex relaxations (Q2349860) (← links)
- Perturbed robust linear estimating equations for confidentiality protection in remote analysis (Q2361456) (← links)
- Differentially private average consensus: obstructions, trade-offs, and optimal algorithm design (Q2409238) (← links)
- A lower bound on the release of differentially private integer partitions (Q2410571) (← links)
- On some connections between statistics and cryptology (Q2437860) (← links)
- Worst- and average-case privacy breaches in randomization mechanisms (Q2517234) (← links)
- Inferring ground truth from crowdsourced data under local attribute differential privacy (Q2661780) (← links)
- Differentially private high dimensional sparse covariance matrix estimation (Q2661783) (← links)
- Differentially private precision matrix estimation (Q2663280) (← links)
- Modular control under privacy protection: fundamental trade-offs (Q2664252) (← links)
- Privacy protection with heavy-tailed noise for linear dynamical systems (Q2665370) (← links)
- Differentially private distributed optimization for multi-agent systems via the augmented Lagrangian algorithm (Q2666749) (← links)
- Differentially private SGD with non-smooth losses (Q2667048) (← links)
- A survey of privacy-preserving mechanisms for heterogeneous data types (Q2668381) (← links)
- Computing payoff allocations in the approximate core of linear programming games in a privacy-preserving manner (Q2670475) (← links)
- Model checking differentially private properties (Q2680992) (← links)
- Differential initial-value privacy and observability of linear dynamical systems (Q2682283) (← links)
- Privacy-preserving dual stochastic push-sum algorithm for distributed constrained optimization (Q2696990) (← links)
- Concurrent composition of differential privacy (Q2697876) (← links)
- Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources (Q2794527) (← links)
- The Complexity of Computing the Optimal Composition of Differential Privacy (Q2796124) (← links)
- Order-Revealing Encryption and the Hardness of Private Learning (Q2796125) (← links)
- Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard (Q2805511) (← links)
- The Geometry of Differential Privacy: The Small Database and Approximate Cases (Q2805515) (← links)
- Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy (Q2817460) (← links)
- Practical Fault-Tolerant Data Aggregation (Q2822685) (← links)
- Private Matchings and Allocations (Q2832895) (← links)
- Pufferfish (Q2943562) (← links)
- Authentication in Constrained Settings (Q2947097) (← links)
- Buying Data from Privacy-Aware Individuals: The Effect of Negative Payments (Q2959821) (← links)
- Super-Polylogarithmic Hypergraph Coloring Hardness via Low-Degree Long Codes (Q2968149) (← links)
- An Almost-Optimally Fair Three-Party Coin-Flipping Protocol (Q2968163) (← links)
- Optimal CUR Matrix Decompositions (Q2968164) (← links)
- EXPONENTIAL IMPROVEMENT IN PRECISION FOR SIMULATING SPARSE HAMILTONIANS (Q2971052) (← links)
- Large Margin Multiclass Gaussian Classification with Differential Privacy (Q3003503) (← links)
- Protecting Privacy in Data Release (Q3092170) (← links)