Differential Privacy

From MaRDI portal
Publication:5901226


DOI10.1007/11787006_1zbMath1133.68330OpenAlexW2911978475WikidataQ56623120 ScholiaQ56623120MaRDI QIDQ5901226

Cynthia Dwork

Publication date: 11 September 2007

Published in: Automata, Languages and Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11787006_1



Related Items

The effect of false positives: Why fuzzy message detection leads to fuzzy privacy guarantees?, Multivariate density estimation from privatised data: universal consistency and minimax rates, Classified generalized linear mixed model prediction incorporating pseudo‐prior information, Differentially private resilient distributed cooperative online estimation over digraphs, Private disclosure with multiple agents, An accurate, scalable and verifiable protocol for federated differentially private averaging, A differentially private distributed optimization method for constrained optimization, Spatial change of support models for differentially private decennial census counts of persons by detailed race and ethnicity, Distribution-invariant differential privacy, Fake information mechanism based privacy-preserving average consensus, Comparing approximate and probabilistic differential privacy parameters, Differentially private trajectory event streams publishing under data dependence constraints, Differential privacy: getting more for less, Differentially private data publishing for arbitrarily partitioned data, Algebra for Quantitative Information Flow, Correlated tuple data release via differential privacy, A firm foundation for statistical disclosure control, Federated personalized random forest for human activity recognition, Providing access to confidential research data through synthesis and verification: an application to data on employees of the U.S. federal government, Differentially private containment control for multi-agent systems, Achieving fair treatment in algorithmic classification, Confidentiality and differential privacy in the dissemination of frequency tables, Product programs and relational program logics, Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security, Publishing set-valued data against realistic adversaries, Computing in social networks, Locality sensitive hashing with extended differential privacy, Survey of information security, Differentially private distributed algorithms for stochastic aggregative games, Verifying Pufferfish privacy in hidden Markov models, Reidentification and \(k\)-anonymity: a model for disclosure risk in graphs, Differentially Private Accelerated Optimization Algorithms, Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases, Statistic selection and MCMC for differentially private Bayesian estimation, Differentially private average consensus: obstructions, trade-offs, and optimal algorithm design, Concentrated differentially private average consensus algorithm for a discrete-time network with heterogeneous dynamics, A survey of privacy-preserving mechanisms for heterogeneous data types, Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk, Are sequential patterns shareable? Ensuring individuals' privacy, Anonymous Data Collection System with Mediators, The \(l\)-diversity problem: tractability and approximability, Denials leak information: simulatable auditing, Probability comprehension of differential privacy for privacy protection algorithms: A new measure, Differential privacy based on importance weighting, On the computational complexities of three problems related to a privacy measure for large networks under active attack, An axiomatization of information flow measures, Model checking differentially private properties, Program algebra for quantitative information flow, Enhancing social network privacy with accumulated non-zero prior knowledge, Buying Data from Privacy-Aware Individuals: The Effect of Negative Payments, A semantic-preserving differentially private method for releasing query logs, Jo-DPMF: differentially private matrix factorization learning through joint optimization, Data confidentiality: a review of methods for statistical disclosure limitation and methods for assessing privacy, Unnamed Item, Differentially private distributed parameter estimation, On some connections between statistics and cryptology, A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics, Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems, A universally composable framework for the privacy of email ecosystems, Logical foundations of information disclosure in ontology-based data integration, Discrimination- and privacy-aware patterns, Privacy preserving distributed optimization using homomorphic encryption, Structural attack to anonymous graph of social networks, Some novel aspects of the positive linear observer problem: differential privacy and optimal \(l_1\) sensitivity, Comparative study of differentially private data synthesis methods, EPiC: efficient privacy-preserving counting for MapReduce, Locally differentially private item-based collaborative filtering, The optimal upper bound of the number of queries for Laplace mechanism under differential privacy, Efficient \(k\)-anonymous microaggregation of multivariate numerical data via principal component analysis, Large Margin Multiclass Gaussian Classification with Differential Privacy, Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows, Optimal data-independent noise for differential privacy, Differentially private nearest neighbor classification, On the smoothness of paging algorithms, FL-MAC-RDP: federated learning over multiple access channels with Rényi differential privacy, Perturbation of convex risk minimization and its application in differential private learning algorithms, Preserving differential privacy under finite-precision semantics, On the Relation between Differential Privacy and Quantitative Information Flow, Synthesis of obfuscation policies to ensure privacy and utility, Analysis of centrality measures under differential privacy models, Generalized bucketization scheme for flexible privacy settings, De-anonymization of heterogeneous random graphs in quasilinear time, Differential privacy in probabilistic systems, Generalized Differential Privacy: Regions of Priors That Admit Robust Optimal Mechanisms, Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract), Efficient secure data publishing algorithms for supporting information sharing, Limiting disclosure of sensitive data in sequential releases of databases, On communication protocols that compute almost privately, Distributed Private Data Analysis: Simultaneously Solving How and What, Generalization-based privacy preservation and discrimination prevention in data publishing and mining, Worst- and average-case privacy breaches in randomization mechanisms, On privacy vs. cooperation in multi-agent systems, Achieving differential privacy of trajectory data publishing in participatory sensing, Security and privacy aspects in MapReduce on clouds: a survey, On density estimation at a fixed point under local differential privacy, A differential privacy framework for collaborative filtering, Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy, Differentially Private Distributed Learning, Optimal Lower Bounds for Universal and Differentially Private Steiner Trees and TSPs, On the power of multiple anonymous messages: frequency estimation and selection in the shuffle model of differential privacy, PrivateLR, Protecting Privacy in Data Release, Quantitative Information Flow and Applications to Differential Privacy, Optimized, direct sale of privacy in personal data marketplaces, Algorithmic Stability for Adaptive Data Analysis, Computing (and Life) Is All about Tradeoffs, Sharing privacy protected and statistically sound clinical research data using outsourced data storage, Pufferfish, Unnamed Item, Unnamed Item, Quantitative classical realizability, The Complexity of Differential Privacy, Blind polynomial evaluation and data trading