Abstract—In this paper, differential privacy in the non-interactive setting is considered, with focus on differentially private mechanisms that generate synthetic databases. As op-posed to the conventional approach that carries out queries as if the synthetic database were the actual database, queries are answered using estimators based on both the released database and the differentially private mechanism. Under this model, the following minimax distortion formulation is used: since the synthetic database is expected to answer all possible queries, the performance of a differentially private mechanism is measured by the worst-case distortion among all queries of interest. Therefore, the smallest distortion at the worst query, which we call...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
The problem of preserving the privacy of individual entries of a database when responding to linear ...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
In this paper, we consider the setting in which the output of a differentially private mechanism is ...
Abstract. The notion of differential privacy has emerged in the area of statisti-cal databases to pr...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
We study mechanisms for differential privacy on finite datasets. By deriving sufficient sets for di...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
A scheme that publishes aggregate information about sen-sitive data must resolve the trade-off betwe...
In this work, we study trade-offs between accuracy and privacy in the context of linear queries over...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention...
This dissertation studies the trade-off between differential privacy and statistical accuracy in par...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
The problem of preserving the privacy of individual entries of a database when responding to linear ...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
In this paper, we consider the setting in which the output of a differentially private mechanism is ...
Abstract. The notion of differential privacy has emerged in the area of statisti-cal databases to pr...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
We study mechanisms for differential privacy on finite datasets. By deriving sufficient sets for di...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
Differential privacy is a framework to quantify to what extent individual privacy in a statistical d...
A scheme that publishes aggregate information about sen-sitive data must resolve the trade-off betwe...
In this work, we study trade-offs between accuracy and privacy in the context of linear queries over...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention...
This dissertation studies the trade-off between differential privacy and statistical accuracy in par...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...
The problem of preserving the privacy of individual entries of a database when responding to linear ...
In this article, we demonstrate that, ignoring computational constraints, it is possible to release ...