scientific article; zbMATH DE number 5485440
zbMATH Open1232.68047MaRDI QIDQ3549600FDOQ3549600
Authors: Cynthia Dwork, Frank McSherry, Kunal Talwar
Publication date: 5 January 2009
Title of this publication is not available (Why is that?)
error ratesprivacy protectionerror-correcting codesstatistical databasepolynomial-time decodable random linear codes
Linear programming (90C05) Database theory (68P15) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Decoding (94B35) Error probability in coding theory (94B70)
Cited In (only showing first 100 items - show all)
- Probability comprehension of differential privacy for privacy protection algorithms: a new measure
- Sample complexity bounds on differentially private learning via communication complexity
- Sylvester-Gallai type theorems for approximate collinearity
- Title not available (Why is that?)
- Homological product codes
- Learning privately with labeled and unlabeled examples
- A differentially private hybrid approach to traffic monitoring
- Discrete optimization methods for group model selection in compressed sensing
- Simultaneous private learning of multiple concepts
- Gaussian differentially private robust mean estimation and inference
- Online local learning via semidefinite programming
- Differentially private distance learning in categorical data
- Federated personalized random forest for human activity recognition
- Average Sensitivity of Graph Algorithms
- Privacy-preserving parameter estimation in distributed cases
- An improved private mechanism for small databases
- Differentially private range query on shortest paths
- Fingerprinting codes and the price of approximate differential privacy
- Turnstile streaming algorithms might as well be linear sketches
- Privacy and truthful equilibrium selection for aggregative games
- Testing surface area with arbitrary accuracy
- Algorithmic stability for adaptive data analysis
- Breaking the Minsky-Papert barrier for constant-depth circuits
- Efficient noise generation to achieve differential privacy with applications to secure multiparty computation
- Constant rank bimatrix games are PPAD-hard
- Differentially private learning of geometric concepts
- Measured continuous greedy with differential privacy
- Low rank matrix recovery with adversarial sparse noise
- The backbone method for ultra-high dimensional sparse machine learning
- Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy
- Efficient and secure outsourcing of differentially private data publication
- On derandomizing algorithms that err extremely rarely
- Private matchings and allocations
- Infinite randomness expansion with a constant number of devices
- Stability is stable: connections between replicability, privacy, and adaptive generalization
- Zig-zag sort
- Preserving differential privacy in deep neural networks with relevance-based adaptive noise imposition
- Buying data from privacy-aware individuals: the effect of negative payments
- Title not available (Why is that?)
- Computing (and Life) Is All about Tradeoffs
- From average case complexity to improper learning complexity
- Cluster before you hallucinate: approximating node-capacitated network design and energy efficient routing
- Improved approximation algorithms for degree-bounded network design problems with node connectivity requirements
- From hierarchical partitions to hierarchical covers: optimal fault-tolerant spanners for doubling metrics
- Competitive algorithms from competitive equilibria: non-clairvoyant scheduling under polyhedral constraints
- Bunched Fuzz: sensitivity for vector metrics
- The average sensitivity of an intersection of half spaces
- Perturbation paradigms of maintaining privacy-preserving monotonicity for differential privacy
- Adversarially robust streaming algorithms via differential privacy
- Fourier PCA and robust tensor decomposition
- On the existence of extractable one-way functions
- Attacks on statistical databases: the highly noisy case
- Distributed approximation algorithms for weighted shortest paths
- Formulas vs. circuits for small distance connectivity
- Embedding and canonizing graphs of bounded genus in logspace
- The sample complexity of revenue maximization
- Smoothed analysis of tensor decompositions
- Differentially private nearest neighbor classification
- Privacy in implementation
- Query complexity of approximate nash equilibria
- Efficient density estimation via piecewise polynomial approximation
- Toward better formula lower bounds: an information complexity approach to the KRW composition conjecture
- Cops, robbers, and threatening skeletons: padded decomposition for minor-free graphs
- Hitting sets for multilinear read-once algebraic branching programs, in any order
- Polynomial bounds for the grid-minor theorem
- Approximate relational Hoare logic for continuous random samplings
- Confidentiality and differential privacy in the dissemination of frequency tables
- Fingerprinting codes and the price of approximate differential privacy
- Distribution-invariant differential privacy
- Approximate distance oracles with constant query time
- Formal verification of differential privacy for interactive systems (extended abstract)
- Breaking the quadratic barrier for 3-LCC's over the reals
- Communication lower bounds via critical block sensitivity
- Primal beats dual on online packing LPs in the random-order model
- The core of the participatory budgeting problem
- A survey on approximation mechanism design without money for facility games
- Efficient money burning in general domains
- Efficient deterministic approximate counting for low-degree polynomial threshold functions
- Lower bounds for depth 4 formulas computing iterated matrix multiplication
- Differentially private data release via statistical election to partition sequentially
- Processing text for privacy: an information flow perspective
- A characterization of strong approximation resistance
- Dichotomies in equilibrium computation, and complementary pivot algorithms for a new class of non-separable utility functions
- Entropy, optimization and counting
- A characterization of locally testable affine-invariant properties via decomposition theorems
- A super-polynomial lower bound for regular arithmetic formulas
- How to delegate computations
- Super-polynomial lower bounds for depth-4 homogeneous arithmetic formulas
- Economic efficiency requires interaction
- Comparative study of differentially private data synthesis methods
- Solving SDD linear systems in nearly \(m \log^{1/2} n\) time
- Privacy, patience, and protection
- Secure sampling with sublinear communication
- An excluded half-integral grid theorem for digraphs and the directed disjoint paths problem
- Optimal error rates for interactive coding. I: Adaptivity and other settings
- A strongly polynomial algorithm for generalized flow maximization
- Analytical approach to parallel repetition
- Coin flipping of any constant bias implies one-way functions
- \(L_p\)-testing
- Satisfiability threshold for random regular NAE-SAT
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3549600)