Differentially Private Selection from Secure Distributed Computing
Abstract
Supplemental Material
- Download
- 101.93 MB
- Download
- 5.26 MB
References
Index Terms
- Differentially Private Selection from Secure Distributed Computing
Recommendations
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, $(\epsilon)$-differential privacy provides one of the strongest privacy guarantees. In this paper,...
A differentially private algorithm for location data release
The rise of mobile technologies in recent years has led to large volumes of location information, which are valuable resources for knowledge discovery such as travel patterns mining and traffic analysis. However, location dataset has been confronted ...
Differentially Private Distributed Optimization
ICDCN '15: Proceedings of the 16th International Conference on Distributed Computing and NetworkingIn distributed optimization and iterative consensus literature, a standard problem is for N agents to minimize a function f over a subset of Euclidean space, where the cost function is expressed as a sum Σ fi. In this paper, we study the private ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Tat-Seng Chua,
- Chong-Wah Ngo,
- Proceedings Chair:
- Roy Ka-Wei Lee,
- Program Chairs:
- Ravi Kumar,
- Hady W. Lauw
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Badges
Author Tags
Qualifiers
- Research-article
Funding Sources
- Novo Nordisk Fonden
- Danish Independent Research Council
- VILLUM Foundation
- European Research Council
- Carlsberg Foundation
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 237Total Downloads
- Downloads (Last 12 months)237
- Downloads (Last 6 weeks)99
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in