Existing studies on differential privacy mainly consider aggregation on data sets where each entry corresponds to a particular participant to be protected. In many situations, a user may pose a relational algebra query on a sensitive database, and desires differentially pri-vate aggregation on the result of the query. However, no known work is capable to release this kind of aggregation when the query contains unrestricted join operations. This severely limits the ap-plications of existing differential privacy techniques because many data analysis tasks require unrestricted joins. One example is sub-graph counting on a graph. Existing methods for differentially pri-vate subgraph counting address only edge differential privacy and are subjec...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention...
Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms an...
Many datasets can be represented by graphs, where nodes correspond to individuals and edges capture ...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Differential privacy (DP) provides formal guarantees that the output of a database query does not re...
Differential privacy has emerged as a de facto standard of privacy notion. It is widely adopted in v...
Data privacy in social networks is a growing concern that threatens to limit access to important inf...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
Abstract Enabling accurate analysis of social network data while preserving differential privacy has...
Differential privacy has gained attention from the community as the mechanism for privacy protection...
Abstract With the increasing prevalence of informa-tion networks, research on privacy-preserving net...
Triangle count is a critical parameter in mining relationships among people in social networks. Howe...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention...
Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms an...
Many datasets can be represented by graphs, where nodes correspond to individuals and edges capture ...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Differential privacy (DP) provides formal guarantees that the output of a database query does not re...
Differential privacy has emerged as a de facto standard of privacy notion. It is widely adopted in v...
Data privacy in social networks is a growing concern that threatens to limit access to important inf...
The concept of differential privacy emerged as an approach to protect the privacy of the individuals...
Recent growth in the size and scope of databases has resulted in more research into making productiv...
Abstract Enabling accurate analysis of social network data while preserving differential privacy has...
Differential privacy has gained attention from the community as the mechanism for privacy protection...
Abstract With the increasing prevalence of informa-tion networks, research on privacy-preserving net...
Triangle count is a critical parameter in mining relationships among people in social networks. Howe...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Differential Privacy is one of the most prominent frameworks used to deal with disclosure prevention...
Motivated by growing concerns over ensuring privacy on social networks, we develop new algorithms an...