4.7 Article

Differential Privacy for Tensor-Valued Queries

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Proceedings Paper Computer Science, Software Engineering

Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform

Mathias Lecuyer et al.

PROCEEDINGS OF THE TWENTY-SEVENTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '19) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Differentially-Private Deep Learning from an Optimization Perspective

Liyao Xiang et al.

IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019) (2019)

Proceedings Paper Computer Science, Theory & Methods

MVG Mechanism: Differential Privacy under Matrix-Valued Query

Thee Chanyaswad et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud

Ji Wang et al.

KDD'18: PROCEEDINGS OF THE 24TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING (2018)

Article Computer Science, Information Systems

The Composition Theorem for Differential Privacy

Peter Kairouz et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Article Computer Science, Information Systems

Optimal Noise Adding Mechanisms for Approximate Differential Privacy

Quan Geng et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Computer Science, Hardware & Architecture

The matrix mechanism: optimizing linear counting queries under differential privacy

Chao Li et al.

VLDB JOURNAL (2015)

Proceedings Paper Computer Science, Theory & Methods

Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds

Raef Bassily et al.

2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014) (2014)

Article Computer Science, Theory & Methods

The Algorithmic Foundations of Differential Privacy

Cynthia Dwork et al.

FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)

Article Computer Science, Information Systems

Functional Mechanism: Regression Analysis under Differential Privacy

Jun Zhang et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2012)

Proceedings Paper Computer Science, Theory & Methods

The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy

Jeremiah Blocki et al.

2012 IEEE 53RD ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS) (2012)

Review Mathematics, Applied

Tensor Decompositions and Applications

Tamara G. Kolda et al.

SIAM REVIEW (2009)

Article Computer Science, Information Systems

Calibrating noise to sensitivity in private data analysis

Cynthia Dwork et al.

THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)