Strong Memory Lower Bounds for Learning Natural Models. | 0 | 0.34 | 2022 |
Differentially Private Simple Linear Regression. | 0 | 0.34 | 2022 |
Reusable Fuzzy Extractors For Low-Entropy Distributions | 1 | 0.35 | 2021 |
Covariance-Aware Private Mean Estimation Without Private Covariance Estimation. | 0 | 0.34 | 2021 |
Manipulation Attacks in Local Differential Privacy | 0 | 0.34 | 2021 |
Differentially Private Model Personalization. | 0 | 0.34 | 2021 |
Differentially Private Sampling from Distributions. | 0 | 0.34 | 2021 |
Algorithmic Stability For Adaptive Data Analysis | 0 | 0.34 | 2021 |
When Are Fuzzy Extractors Possible? | 0 | 0.34 | 2020 |
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space | 0 | 0.34 | 2020 |
Empirical Risk Minimization In The Non-Interactive Local Model Of Differential Privacy | 0 | 0.34 | 2020 |
From Soft Classifiers to Hard Decisions: How fair can we be? | 0 | 0.34 | 2019 |
Noninteractive Locally Private Learning of Linear Models via Polynomial Approximations. | 0 | 0.34 | 2019 |
Differentially Private Empirical Risk Minimization in Non-interactive Local Model via Polynomial of Inner Product Approximation. | 0 | 0.34 | 2018 |
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. | 0 | 0.34 | 2018 |
The Limits of Post-Selection Generalization. | 0 | 0.34 | 2018 |
Reminiscences about Steve Fienberg. | 0 | 0.34 | 2018 |
The Limits of Post-Selection Generalization. | 1 | 0.36 | 2018 |
Private Algorithms Can Always Be Extended. | 0 | 0.34 | 2018 |
Distributed Differential Privacy via Mixnets. | 2 | 0.38 | 2018 |
Is Interaction Necessary for Distributed Private Learning? | 12 | 0.61 | 2017 |
Information, Privacy and Stability in Adaptive Data Analysis. | 0 | 0.34 | 2017 |
When Is Non-Trivial Estimation Possible For Graphons And Stochastic Block Models? | 1 | 0.36 | 2016 |
Computer Simulations Imply Forelimb-Dominated Underwater Flight in Plesiosaurs | 0 | 0.34 | 2015 |
Private Graphon Estimation for Sparse Graphs | 13 | 0.70 | 2015 |
More General Queries and Less Generalization Error in Adaptive Data Analysis. | 4 | 0.71 | 2015 |
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs | 20 | 0.68 | 2015 |
On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption. | 0 | 0.34 | 2015 |
Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions. | 6 | 0.46 | 2015 |
Cloud Computing: Adoption Considerations for Business and Education | 6 | 0.54 | 2014 |
Causal erasure channels | 1 | 0.37 | 2014 |
Privacy-Preserving Public Information for Sequential Games | 5 | 0.54 | 2014 |
On the `Semantics' of Differential Privacy: A Bayesian Formulation | 23 | 1.03 | 2014 |
Private Empirical Risk Minimization, Revisited. | 9 | 0.66 | 2014 |
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs. | 4 | 0.49 | 2013 |
(Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings. | 17 | 0.75 | 2013 |
Sublinear Algorithms for Approximating String Compressibility. | 0 | 0.34 | 2013 |
The power of linear reconstruction attacks | 14 | 1.06 | 2013 |
Regularity of Lossy RSA on Subdomains and Its Applications. | 5 | 0.41 | 2013 |
Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso. | 29 | 1.16 | 2013 |
Analyzing graphs with node differential privacy | 61 | 1.45 | 2013 |
Private Convex Optimization for Empirical Risk Minimization with Applications to High-dimensional Regression. | 17 | 0.88 | 2012 |
Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy | 5 | 0.50 | 2012 |
Private Analysis of Graph Structure | 39 | 0.97 | 2011 |
Classical cryptographic protocols in a quantum world | 15 | 0.81 | 2011 |
What Can We Learn Privately? | 118 | 6.97 | 2011 |
Privacy-preserving statistical estimation with optimal convergence rates | 67 | 2.34 | 2011 |
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets | 85 | 3.03 | 2010 |
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows | 56 | 2.92 | 2010 |
Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate | 30 | 1.40 | 2010 |