Discovering causal relationships by constructing the causal graph provides critical information to researchers and decision makers. Yet releasing causal graphs may risk leakage of individual participant\u27s privacy. It is very underexploited how to enforce differential privacy in causal graph discovery. In this work, we focus on the PC algorithm, a classic constraint-based causal graph discovery algorithm, and propose a differentially private PC algorithm (PrivPC) for categorical data. PrivPC adopts the exponential mechanism and significantly reduces the number of edge elimination decisions. Therefore, it incurs much less privacy budget than the naive approaches that add privacy protection at each conditional independence test. For numeric...
In this article, we present a privacy-preserving technique for user-centric multi-release graphs. Ou...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Abstract With the increasing prevalence of informa-tion networks, research on privacy-preserving net...
Recently, several methods such as private ANM, EM-PC and Priv-PC have been proposed to perform diffe...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Differential privacy has emerged as a de facto standard of privacy notion. It is widely adopted in v...
Differential privacy is a widely adopted framework designed to safeguard the sensitive information o...
Discovering frequent graph patterns in a graph database offers valuable information in a variety of ...
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Many data analysis tasks rely on the abstraction of a graph to represent relations between entities,...
Releasing sensitive data while preserving privacy is an important problem that has attracted conside...
In the information age, vast amounts of sensitive personal information are collected by companies, i...
The construction of causal graphs from non-experimental data rests on a set of constraints that the ...
The construction of causal graphs from non-experimental data rests on a set of constraints that the ...
Abstract In this article, we present a privacy-preserving technique for user-centric multi-release ...
In this article, we present a privacy-preserving technique for user-centric multi-release graphs. Ou...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Abstract With the increasing prevalence of informa-tion networks, research on privacy-preserving net...
Recently, several methods such as private ANM, EM-PC and Priv-PC have been proposed to perform diffe...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Differential privacy has emerged as a de facto standard of privacy notion. It is widely adopted in v...
Differential privacy is a widely adopted framework designed to safeguard the sensitive information o...
Discovering frequent graph patterns in a graph database offers valuable information in a variety of ...
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Many data analysis tasks rely on the abstraction of a graph to represent relations between entities,...
Releasing sensitive data while preserving privacy is an important problem that has attracted conside...
In the information age, vast amounts of sensitive personal information are collected by companies, i...
The construction of causal graphs from non-experimental data rests on a set of constraints that the ...
The construction of causal graphs from non-experimental data rests on a set of constraints that the ...
Abstract In this article, we present a privacy-preserving technique for user-centric multi-release ...
In this article, we present a privacy-preserving technique for user-centric multi-release graphs. Ou...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Abstract With the increasing prevalence of informa-tion networks, research on privacy-preserving net...