Differential Privacy

Results: 191



#Item
51Mathematical analysis / Differential privacy / Metric / Differential calculus / Privacy / Internet privacy / Differential of a function / Ethics / Data privacy / Mathematics

Differential Privacy with Arbitrary Metrics Kostas Chatzikokolakis CNRS, INRIA and LIX, Ecole Polytechnique Abstract. Differential privacy is a well-known notion of privacy from the field of statistical databases. It req

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:09
52Computational statistics / Statistics / Applied probability / Exponential mechanism / Differential privacy / ID3 algorithm / Decision tree learning / Synthetic data / Data mining / Decision trees / Machine learning / Data privacy

Data Mining with Differential Privacy Arik Friedman and Assaf Schuster Technion - Israel Institute of Technology Haifa 32000, Israel {arikf,assaf}@cs.technion.ac.il

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-05-21 05:11:05
53Data privacy / Differential privacy / Secure multi-party computation / Privacy / Internet privacy / Information privacy / Entropy / Secret sharing / Data mining / Cryptography / Cryptographic protocols / Formal sciences

Poster: Differentially Private Decision Tree Learning from Distributed Data Parisa Kaghazgaran Hassan Takabi

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:26
54Molecular biology / Data privacy / Population genetics / Differential privacy / Privacy / Genome-wide association study / Single-nucleotide polymorphism / SNP genotyping / Minor allele frequency / Biology / Genetics / DNA

2015 IEEE CS Security and Privacy Workshops One Size Doesn’t Fit All: Measuring Individual Privacy in Aggregate Genomic Data Sean Simmons and Bonnie Berger Department of Mathematics and CSAIL

Add to Reading List

Source URL: www.genopri.org

Language: English - Date: 2015-05-21 15:27:09
55

2011 IEEE Symposium on Security and Privacy Differential Slicing: Identifying Causal Execution Differences for Security Applications Noah M. Johnson† , Juan Caballero‡ , Kevin Zhijie Chen† , Stephen McCamant† ,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2011-04-10 18:07:02
    56

    Computational Differential Privacy Ilya Mironov Omkant Pandey Omer Reingold Salil Vadhan

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2009-09-22 18:21:14
      57

      Differential Privacy Under Continual Observation Cynthia Dwork Microsoft Research Mountain View, CA, USA

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2010-05-25 10:35:36
        58

        2011 IEEE Symposium on Security and Privacy Differential Slicing: Identifying Causal Execution Differences for Security Applications Noah M. Johnson† , Juan Caballero‡ , Kevin Zhijie Chen† , Stephen McCamant† ,

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2011-04-10 18:07:02
          59

          Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy Gilles Barthe, Marco Gaboardi, Emilio Jesús Gallego Arias, Justin Hsu, Aaron Roth, Pierre-Yves Strub UPenn-Mines ParisTe

          Add to Reading List

          Source URL: www.cri.ensmp.fr

          Language: English - Date: 2015-04-21 07:32:50
            60Applied probability / Exponential mechanism / Computational complexity theory / Differential privacy / Symbol / Information theory / Time complexity / Net / Data privacy / Applied mathematics / Mathematics

            On the Complexity of Differentially Private Data Release Efficient Algorithms and Hardness Results Cynthia Dwork ∗

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            Language: English - Date: 2009-06-21 11:53:00
            UPDATE