Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Some 3CNF properties are hard to test
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
Proceedings of the 16th international conference on World Wide Web
Smooth sensitivity and sampling in private data analysis
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
The price of privacy and the limits of LP decoding
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Challenges in mining social network data: processes, privacy, and paradoxes
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Secure two-party k-means clustering
Proceedings of the 14th ACM conference on Computer and communications security
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Distributed Private Data Analysis: Simultaneously Solving How and What
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
New Efficient Attacks on Statistical Disclosure Control Mechanisms
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Resisting structural re-identification in anonymized social networks
Proceedings of the VLDB Endowment
Access control over uncertain data
Proceedings of the VLDB Endowment
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Releasing search queries and clicks privately
Proceedings of the 18th international conference on World wide web
Adversarial-knowledge dimensions in data privacy
The VLDB Journal — The International Journal on Very Large Data Bases
The Differential Privacy Frontier (Extended Abstract)
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Universally utility-maximizing privacy mechanisms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Proceedings of the forty-first annual ACM symposium on Theory of computing
Differential privacy and robust statistics
Proceedings of the forty-first annual ACM symposium on Theory of computing
On the complexity of differentially private data release: efficient algorithms and hardness results
Proceedings of the forty-first annual ACM symposium on Theory of computing
Differentially private recommender systems: building privacy into the net
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Relationship privacy: output perturbation for queries with joins
Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Proceedings of the 18th ACM conference on Information and knowledge management
Proceedings of the 16th ACM conference on Computer and communications security
Data publishing against realistic adversaries
Proceedings of the VLDB Endowment
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
FM '09 Proceedings of the 2nd World Congress on Formal Methods
Asymptotically Optimal and Private Statistical Estimation
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Differential privacy with compression
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Differential privacy for collaborative security
Proceedings of the Third European Workshop on System Security
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
Towards publishing recommendation data with predictive anonymization
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Consensus-based distributed linear support vector machines
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
Differential privacy under continual observation
Proceedings of the forty-second ACM symposium on Theory of computing
Interactive privacy via the median mechanism
Proceedings of the forty-second ACM symposium on Theory of computing
Proceedings of the forty-second ACM symposium on Theory of computing
Optimizing linear counting queries under differential privacy
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Universally optimal privacy mechanisms for minimax agents
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Programming with differential privacy: technical perspective
Communications of the ACM
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Data mining with differential privacy
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Discovering frequent patterns in sensitive data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially-private network trace analysis
Proceedings of the ACM SIGCOMM 2010 conference
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Consensus-Based Distributed Support Vector Machines
The Journal of Machine Learning Research
Distance makes the types grow stronger: a calculus for differential privacy
Proceedings of the 15th ACM SIGPLAN international conference on Functional programming
A firm foundation for private data analysis
Communications of the ACM
Investigating privacy-aware distributed query evaluation
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Differential privacy in new settings
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Differentially private combinatorial optimization
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Private and continual release of statistics
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Differential privacy and the fat-shattering dimension of linear queries
APPROX/RANDOM'10 Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques
Differential privacy and the risk-utility tradeoff for multi-dimensional contingency tables
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
Differentially private data release through multidimensional partitioning
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Boosting the accuracy of differentially private histograms through consistency
Proceedings of the VLDB Endowment
Resisting structural re-identification in anonymized social networks
The VLDB Journal — The International Journal on Very Large Data Bases
Practical universal random sampling
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Mixture of gaussian models and bayes error under differential privacy
Proceedings of the first ACM conference on Data and application security and privacy
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Verification of data pattern for interactive privacy preservation model
Proceedings of the 2011 ACM Symposium on Applied Computing
PCPs and the hardness of generating private synthetic data
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Limits of computational differential privacy in the client/server setting
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Towards privacy for social networks: a zero-knowledge based definition of privacy
TCC'11 Proceedings of the 8th conference on Theory of cryptography
Personalized social recommendations: accurate or private
Proceedings of the VLDB Endowment
Pan-private algorithms via statistics on sketches
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
iReduct: differential privacy with reduced relative errors
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Neighborhood-privacy protected shortest distance computing in cloud
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Privacy-aware data management in information networks
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Proceedings of the 12th ACM conference on Electronic commerce
Privately releasing conjunctions and the statistical query barrier
Proceedings of the forty-third annual ACM symposium on Theory of computing
Privacy-preserving statistical estimation with optimal convergence rates
Proceedings of the forty-third annual ACM symposium on Theory of computing
Adaptive, secure, and scalable distributed data outsourcing: a vision paper
Proceedings of the 2011 workshop on Dynamic distributed data-intensive applications, programming abstractions, and systems
Large margin multiclass gaussian classification with differential privacy
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
An information theoretic approach for privacy metrics
Transactions on Data Privacy
Differentially private data release for data mining
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Differential privacy under fire
SEC'11 Proceedings of the 20th USENIX conference on Security
Protecting privacy in data release
Foundations of security analysis and design VI
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving statistical analysis on ubiquitous health data
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
To release or not to release: evaluating information leaks in aggregate human-genome data
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
I have a DREAM!: differentially private smart metering
IH'11 Proceedings of the 13th international conference on Information hiding
Communications of the ACM
Private and Continual Release of Statistics
ACM Transactions on Information and System Security (TISSEC)
Protecting against physical resource monitoring
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Compressive mechanism: utilizing sparse representation in differential privacy
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Proceedings of the 4th ACM workshop on Security and artificial intelligence
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract)
Electronic Notes in Theoretical Computer Science (ENTCS)
How much is enough? choosing ε for differential privacy
ISC'11 Proceedings of the 14th international conference on Information security
Cloning for privacy protection in multiple independent data publications
Proceedings of the 20th ACM international conference on Information and knowledge management
Sharing graphs using differentially private graph models
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Differential privacy for location pattern mining
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
SIAM Journal on Computing
Ask a better question, get a better answer a new approach to private data analysis
ICDT'07 Proceedings of the 11th international conference on Database Theory
Approximately optimal mechanism design via differential privacy
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Private data release via learning thresholds
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms
Submodular functions are noise stable
Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Probabilistic relational reasoning for differential privacy
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Bounds on the sample complexity for private learning and private data release
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
When random sampling preserves privacy
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Differential privacy with information flow control
Proceedings of the ACM SIGPLAN 6th Workshop on Programming Languages and Analysis for Security
An adaptive mechanism for accurate query answering under differential privacy
Proceedings of the VLDB Endowment
Our data, ourselves: privacy via distributed noise generation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Private similarity computation in distributed systems: from cryptography to differential privacy
OPODIS'11 Proceedings of the 15th international conference on Principles of Distributed Systems
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
Secure data management in the cloud
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
What next?: a half-dozen data management research goals for big data and the cloud
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
A rigorous and customizable framework for privacy
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
GUPT: privacy preserving data analysis made easy
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Aggregate suppression for enterprise search engines
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Beating randomized response on incoherent matrices
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Unconditional differentially private mechanisms for linear queries
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Optimal private halfspace counting via discrepancy
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Fast track article: Balancing behavioral privacy and information utility in sensory data flows
Pervasive and Mobile Computing
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Approximately optimal auctions for selling privacy when costs are correlated with data
Proceedings of the 13th ACM Conference on Electronic Commerce
Privacy-aware mechanism design
Proceedings of the 13th ACM Conference on Electronic Commerce
Lower bounds in differential privacy
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Iterative constructions and private data release
TCC'12 Proceedings of the 9th international conference on Theory of Cryptography
Differentially private search log sanitization with optimal output utility
Proceedings of the 15th International Conference on Extending Database Technology
Integrating historical noisy answers for improving data utility under differential privacy
Proceedings of the 15th International Conference on Extending Database Technology
Differential privacy and the power of (formalizing) negative thinking
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Approximately strategy-proof voting
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume One
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
A differentially private estimator for the stochastic Kronecker graph model
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Differentially-private learning and information theory
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Buying private data at auction: the sensitive surveyor's problem
ACM SIGecom Exchanges
Privacy preservation by disassociation
Proceedings of the VLDB Endowment
Knowledge-oriented secure multiparty computation
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
A workflow for differentially-private graph synthesis
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Keeping information safe from social networking apps
Proceedings of the 2012 ACM workshop on Workshop on online social networks
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Low-rank mechanism: optimizing batch queries under differential privacy
Proceedings of the VLDB Endowment
Functional mechanism: regression analysis under differential privacy
Proceedings of the VLDB Endowment
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Adaptive differentially private histogram of low-dimensional data
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Distributed private heavy hitters
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Faster algorithms for privately releasing marginals
ICALP'12 Proceedings of the 39th international colloquium conference on Automata, Languages, and Programming - Volume Part I
Differentially private iterative synchronous consensus
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Differentially private sequential data publication via variable-length n-grams
Proceedings of the 2012 ACM conference on Computer and communications security
On significance of the least significant bits for differential privacy
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy-aware personalization for mobile advertising
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the 2012 ACM conference on Computer and communications security
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Differentially private top-k query over MapReduce
Proceedings of the fourth international workshop on Cloud data management
Frequent grams based embedding for privacy preserving record linkage
Proceedings of the 21st ACM international conference on Information and knowledge management
Real-time aggregate monitoring with differential privacy
Proceedings of the 21st ACM international conference on Information and knowledge management
Optimal lower bound for differentially private multi-party aggregation
ESA'12 Proceedings of the 20th Annual European conference on Algorithms
Differentially private projected histograms: construction and use for prediction
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
BLIP: non-interactive differentially-private similarity computation on bloom filters
SSS'12 Proceedings of the 14th international conference on Stabilization, Safety, and Security of Distributed Systems
Worst- and average-case privacy breaches in randomization mechanisms
TCS'12 Proceedings of the 7th IFIP TC 1/WG 202 international conference on Theoretical Computer Science
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Confidentialising maps of mixed point and diffuse spatial data
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Security of random output perturbation for statistical databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Empirical evaluation of statistical inference from differentially-private contingency tables
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Differentially private graphical degree sequences and synthetic graphs
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Is privacy compatible with truthfulness?
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Differentially private data analysis of social networks via restricted sensitivity
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Characterizing the sample complexity of private learners
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Non-interactive differential privacy: a survey
Proceedings of the First International Workshop on Open Data
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
On differentially private frequent itemset mining
Proceedings of the VLDB Endowment
Linear dependent types for differential privacy
POPL '13 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Bayesian mechanism design with efficiency, privacy, and approximate truthfulness
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Privacy auctions for recommender systems
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Take it or leave it: running a survey when privacy comes at a cost
WINE'12 Proceedings of the 8th international conference on Internet and Network Economics
Differential privacy data release through adding noise on average value
NSS'12 Proceedings of the 6th international conference on Network and System Security
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
A theory of pricing private data
Proceedings of the 16th International Conference on Database Theory
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
On optimal differentially private mechanisms for count-range queries
Proceedings of the 16th International Conference on Database Theory
Optimal error of query sets under the differentially-private matrix mechanism
Proceedings of the 16th International Conference on Database Theory
Private decayed predicate sums on streams
Proceedings of the 16th International Conference on Database Theory
A learning theory approach to noninteractive database privacy
Journal of the ACM (JACM)
Testing the lipschitz property over product distributions with applications to data privacy
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Analyzing graphs with node differential privacy
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Efficient privacy-aware record integration
Proceedings of the 16th International Conference on Extending Database Technology
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
On Learning Cluster Coefficient of Private Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
A privacy framework: indistinguishable privacy
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Secure multiparty aggregation with differential privacy: a comparative study
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Privacy-preserving release of aggregate dynamic models
Proceedings of the 2nd ACM international conference on High confidence networked systems
Differential privacy in intelligent transportation systems
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
FAST: differentially private real-time aggregate monitor with filtering and adaptive sampling
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
LinkIT: privacy preserving record linkage and integration via transformations
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Recursive mechanism: towards node differential privacy and unrestricted joins
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
PrivGene: differentially private model fitting using genetic algorithms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Information-Theoretic foundations of differential privacy
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Truthful mechanisms for agents that value privacy
Proceedings of the fourteenth ACM conference on Electronic commerce
Privacy and coordination: computing on databases with endogenous participation
Proceedings of the fourteenth ACM conference on Electronic commerce
πBox: a platform for privacy-preserving apps
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Publishing trajectories with differential privacy guarantees
Proceedings of the 25th International Conference on Scientific and Statistical Database Management
SplitX: high-performance private analytics
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Mining frequent graph patterns with differential privacy
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving data exploration in genome-wide association studies
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Practical differential privacy via grouping and smoothing
Proceedings of the VLDB Endowment
How robust are linear sketches to adaptive inputs?
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Differential privacy for the analyst via private equilibrium computation
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
The geometry of differential privacy: the sparse and approximate cases
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Answering n{2+o(1)} counting queries with differential privacy is hard
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Optimal bounds for monotonicity and lipschitz testing over hypercubes and hypergrids
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Dependent Type Theory for Verification of Information Flow and Access Control Policies
ACM Transactions on Programming Languages and Systems (TOPLAS)
Probabilistic Relational Reasoning for Differential Privacy
ACM Transactions on Programming Languages and Systems (TOPLAS)
Differential privacy for neighborhood-based collaborative filtering
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Differential privacy for functions and functional data
The Journal of Machine Learning Research
Outsourcing shortest distance computing with privacy protection
The VLDB Journal — The International Journal on Very Large Data Bases
A two-phase algorithm for mining sequential patterns with differential privacy
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
UMicS: from anonymized data to usable microdata
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Denials leak information: Simulatable auditing
Journal of Computer and System Sciences
CUDIA: Probabilistic cross-level imputation using individual auxiliary information
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
ACM SIGecom Exchanges
Pufferfish: A framework for mathematical privacy definitions
ACM Transactions on Database Systems (TODS)
Membership privacy: a unifying framework for privacy definitions
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Geo-indistinguishability: differential privacy for location-based systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
On the challenges of balancing privacy and utility of open health data
Joint Proceedings of the Workshop on AI Problems and Approaches for Intelligent Environments and Workshop on Semantic Cities
DiffR-Tree: a differentially private spatial index for OLAP query
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Haze: privacy-preserving real-time traffic statistics
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
VICUS: a noise addition technique for categorical data
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
A privacy-preserving location-based alert system
Proceedings of the 21st ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Differentially private multi-dimensional time series release for traffic monitoring
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
Federated flow-based approach for privacy preserving connectivity tracking
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Exposing and mitigating privacy loss in crowdsourced survey platforms
Proceedings of the 2013 workshop on Student workhop
Faster private release of marginals on small databases
Proceedings of the 5th conference on Innovations in theoretical computer science
Mechanism design in large games: incentives and privacy
Proceedings of the 5th conference on Innovations in theoretical computer science
Redrawing the boundaries on purchasing data from privacy-sensitive individuals
Proceedings of the 5th conference on Innovations in theoretical computer science
Understanding hierarchical methods for differentially private histograms
Proceedings of the VLDB Endowment
Proceedings of the 4th ACM conference on Data and application security and privacy
Efficient privacy-aware search over encrypted databases
Proceedings of the 4th ACM conference on Data and application security and privacy
Privacy-preserving publication of provenance workflows
Proceedings of the 4th ACM conference on Data and application security and privacy
Differential privacy based on importance weighting
Machine Learning
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Monitoring web browsing behavior with differential privacy
Proceedings of the 23rd international conference on World wide web
Differentially private histogram publication
The VLDB Journal — The International Journal on Very Large Data Bases
Distributed and Parallel Databases
Hi-index | 0.06 |
We continue a line of research initiated in [10,11]on privacy-preserving statistical databases. Consider a trusted server that holds a database of sensitive information. Given a query function f mapping databases to reals, the so-called true answer is the result of applying f to the database. To protect privacy, the true answer is perturbed by the addition of random noise generated according to a carefully chosen distribution, and this response, the true answer plus noise, is returned to the user. Previous work focused on the case of noisy sums, in which f = ∑ig(xi), where xi denotes the ith row of the database and g maps database rows to [0,1]. We extend the study to general functions f, proving that privacy can be preserved by calibrating the standard deviation of the noise according to the sensitivity of the function f. Roughly speaking, this is the amount that any single argument to f can change its output. The new analysis shows that for several particular applications substantially less noise is needed than was previously understood to be the case. The first step is a very clean characterization of privacy in terms of indistinguishability of transcripts. Additionally, we obtain separation results showing the increased value of interactive sanitization mechanisms over non-interactive.