• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 267
Next 10 →

Differential Privacy and Private Bayesian Inference‹

by Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein
"... We consider a Bayesian statistician (B) communicating with an untrusted third party (A). B wants to convey useful answers to the queries of A, but with-out revealing private information. For example, we may want to give statistics about how many people suffer from a disease, but without revealing wh ..."
Abstract - Add to MetaCart
We consider a Bayesian statistician (B) communicating with an untrusted third party (A). B wants to convey useful answers to the queries of A, but with-out revealing private information. For example, we may want to give statistics about how many people suffer from a disease, but without revealing

B.: Robust and private Bayesian inference

by Christos Dimitrakakis, Blaine Nelson, Aikaterini Mitrokotsa, Benjamin I. P. Rubinstein
"... Abstract. We examine the robustness and privacy of Bayesian infer-ence, under assumptions on the prior, and with no modications to the Bayesian framework. First, we generalise the concept of differential pri-vacy to arbitrary dataset distances, outcome spaces and distribution fam-ilies. We then prov ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
Abstract. We examine the robustness and privacy of Bayesian infer-ence, under assumptions on the prior, and with no modications to the Bayesian framework. First, we generalise the concept of differential pri-vacy to arbitrary dataset distances, outcome spaces and distribution fam-ilies. We

On Differentially Private Inductive Logic Programming

by Chen Zeng, Eric Lantz, Jeffrey F. Naughton
"... Abstract. We consider differentially private inductive logic program-ming. We begin by formulating the problem of guaranteeing differential privacy to inductive logic programming, and then prove the theoretical difficulty of simultaneously providing good utility and good privacy in this task. While ..."
Abstract - Add to MetaCart
Abstract. We consider differentially private inductive logic program-ming. We begin by formulating the problem of guaranteeing differential privacy to inductive logic programming, and then prove the theoretical difficulty of simultaneously providing good utility and good privacy in this task. While

Managing Distributed, Shared L2 Caches through OS-Level Page Allocation

by Sangyeun Cho, Lei Jin - IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE , 2006
"... This paper presents and studies a distributed L2 cache management approach through OS-level page allocation for future many-core processors. L2 cache management is a crucial multicore processor design aspect to overcome non-uniform cache access latency for good program performance and to reduce on-c ..."
Abstract - Cited by 134 (11 self) - Add to MetaCart
hardware support. Furthermore, our approach can provide differentiated execution environment to running programs by dynamically controlling data placement and cache sharing degrees. We discuss key design issues of the proposed approach and present preliminary experimental results showing the promise of our

Privbayes: Private data release via bayesian networks

by Jun Zhang , Graham Cormode , Cecilia M Procopiuc , Divesh Srivastava , Xiaokui Xiao - SIGMOD , 2014
"... ABSTRACT Privacy-preserving data publishing is an important problem that has been the focus of extensive study. The state-of-the-art goal for this problem is differential privacy, which offers a strong degree of privacy protection without making restrictive assumptions about the adversary. Existing ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
, which renders the published data next to useless. To address the deficiency of the existing methods, this paper presents PRIVBAYES, a differentially private method for releasing high-dimensional data. Given a dataset D, PRIVBAYES first constructs a Bayesian network N , which (i) provides a succinct

Differentially-private Learning and Information Theory

by Darakhshan Mir
"... Using results from PAC-Bayesian bounds in learning theory, we formulate differentially-private learning in an information theoretic framework. This, to our knowledge, is the first such treatment of this increasingly popular notion of data privacy. We examine differential privacy in the PAC-Bayesian ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Using results from PAC-Bayesian bounds in learning theory, we formulate differentially-private learning in an information theoretic framework. This, to our knowledge, is the first such treatment of this increasingly popular notion of data privacy. We examine differential privacy in the PAC-Bayesian

Information-theoretic bounds for differentially private mechanisms

by Gilles Barthe, Boris Köpf - In 24rd IEEE Computer Security Foundations Symposium, CSF 2011. IEEE Computer Society, Los Alamitos
"... Abstract—There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data. Each line of research has developed its own notion of confidentiality: on the one hand, differential privacy is the emerging consensu ..."
Abstract - Cited by 25 (2 self) - Add to MetaCart
of confidentiality, and to compare them in terms of the security guarantees they deliver. We obtain the following results. First, we establish upper bounds for the leakage of every ɛ-differentially private mechanism in terms of ɛ and the size of the mechanism’s input domain. We achieve this by identifying

L.: Bayesian inference under differential privacy

by Yonghui Xiao, Li Xiong
"... Bayesian inference is an important technique throughout statistics. The essence of Beyesian inference is to derive the posterior belief updated from prior belief by the learned information, which is a set of differentially private answers under differential privacy. Although Bayesian inference can b ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Bayesian inference is an important technique throughout statistics. The essence of Beyesian inference is to derive the posterior belief updated from prior belief by the learned information, which is a set of differentially private answers under differential privacy. Although Bayesian inference can

Coalitional Bayesian Nash implementation in differential information economies, mimeo

by Guangsug Hahn, Nicholas C. Yannelis - University of Illinois at Urbana-Champaign , 1995
"... Summary. A mechanism coalitionally implements a social choice set if any out-come of the social choice set can be achieved as a coalitional Bayesian Nash equilibrium of a mechanism and vice versa. We say that a social choice set is coalitionally implementable if there is a mechanism which coalitiona ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
condition. As an application of our main result, we show that the private core and the private Shapley value of an economy with differential information are coalitionally implementable.

A workflow for differentially-private graph synthesis

by Davide Proserpio, Sharon Goldberg, Frank Mcsherry , 2012
"... We present a new workflow for differentially-private publication of graph topologies. First, we produce differentiallyprivate measurements of interesting graph statistics using our new version of the PINQ programming language, Weighted PINQ, which is based on a generalization of differential privacy ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
We present a new workflow for differentially-private publication of graph topologies. First, we produce differentiallyprivate measurements of interesting graph statistics using our new version of the PINQ programming language, Weighted PINQ, which is based on a generalization of differential
Next 10 →
Results 1 - 10 of 267
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University