Name
Affiliation
Papers
ADAM SMITH
The Pennsylvania State University, University Park, PA
90
Collaborators
Citations 
PageRank 
129
4183
229.81
Referers 
Referees 
References 
5503
1131
1300
Search Limit
1001000
Title
Citations
PageRank
Year
Strong Memory Lower Bounds for Learning Natural Models.00.342022
Differentially Private Simple Linear Regression.00.342022
Reusable Fuzzy Extractors For Low-Entropy Distributions10.352021
Covariance-Aware Private Mean Estimation Without Private Covariance Estimation.00.342021
Manipulation Attacks in Local Differential Privacy00.342021
Differentially Private Model Personalization.00.342021
Differentially Private Sampling from Distributions.00.342021
Algorithmic Stability For Adaptive Data Analysis00.342021
When Are Fuzzy Extractors Possible?00.342020
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space00.342020
Empirical Risk Minimization In The Non-Interactive Local Model Of Differential Privacy00.342020
From Soft Classifiers to Hard Decisions: How fair can we be?00.342019
Noninteractive Locally Private Learning of Linear Models via Polynomial Approximations.00.342019
Differentially Private Empirical Risk Minimization in Non-interactive Local Model via Polynomial of Inner Product Approximation.00.342018
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.00.342018
The Limits of Post-Selection Generalization.00.342018
Reminiscences about Steve Fienberg.00.342018
The Limits of Post-Selection Generalization.10.362018
Private Algorithms Can Always Be Extended.00.342018
Distributed Differential Privacy via Mixnets.20.382018
Is Interaction Necessary for Distributed Private Learning?120.612017
Information, Privacy and Stability in Adaptive Data Analysis.00.342017
When Is Non-Trivial Estimation Possible For Graphons And Stochastic Block Models?10.362016
Computer Simulations Imply Forelimb-Dominated Underwater Flight in Plesiosaurs00.342015
Private Graphon Estimation for Sparse Graphs130.702015
More General Queries and Less Generalization Error in Adaptive Data Analysis.40.712015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs200.682015
On the Regularity of Lossy RSA - Improved Bounds and Applications to Padding-Based Encryption.00.342015
Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions.60.462015
Cloud Computing: Adoption Considerations for Business and Education60.542014
Causal erasure channels10.372014
Privacy-Preserving Public Information for Sequential Games50.542014
On the `Semantics' of Differential Privacy: A Bayesian Formulation231.032014
Private Empirical Risk Minimization, Revisited.90.662014
Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs.40.492013
(Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings.170.752013
Sublinear Algorithms for Approximating String Compressibility.00.342013
The power of linear reconstruction attacks141.062013
Regularity of Lossy RSA on Subdomains and Its Applications.50.412013
Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso.291.162013
Analyzing graphs with node differential privacy611.452013
Private Convex Optimization for Empirical Risk Minimization with Applications to High-dimensional Regression.170.882012
Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy50.502012
Private Analysis of Graph Structure390.972011
Classical cryptographic protocols in a quantum world150.812011
What Can We Learn Privately?1186.972011
Privacy-preserving statistical estimation with optimal convergence rates672.342011
Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets853.032010
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows562.922010
Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate301.402010
  • 1
  • 2