We introduce the notion of restricted sensitivity as an alternative to global and smooth sensitivity to improve accuracy in differentially private data analysis. The definition of restricted sensitivity is similar to that of global sensitivity except that instead of quantifying over all possible datasets, we take advantage of any beliefs about the dataset that a querier may have, to quantify over a restricted class of datasets. Specifically, given a query f and a hypothesis H about the structure of a dataset D, we show generically how to transform f into a new query f_H whose global sensitivity (over all datasets including those that do not satisfy H) matches the restricted sensitivity of the query f. Moreover, if the belief of the querier ...
Vast amounts of sensitive personal information are collected by companies, institutions and governme...
This dissertation is a study in the applications of algorithmic techniques to four specific problems ...
Differential privacy is known to protect against threats to validity incurred due to adaptive, or ex...
Abstract Enabling accurate analysis of social network data while preserving differential privacy has...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Data privacy in social networks is a growing concern that threatens to limit access to important inf...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Differentially private GNNs (Graph Neural Networks) have been recently studied to provide high accur...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
The increasing collection and use of sensitive personal data raises important privacy concerns. Anot...
Information networks, such as social media and email net-works, often contain sensitive information....
Vast amounts of sensitive personal information are collected by companies, institutions and governme...
This dissertation is a study in the applications of algorithmic techniques to four specific problems ...
Differential privacy is known to protect against threats to validity incurred due to adaptive, or ex...
Abstract Enabling accurate analysis of social network data while preserving differential privacy has...
Differential privacy (DP) has gained significant attention lately as the state of the art in privacy...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
We present an approach to differentially private computa-tion in which one does not scale up the mag...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Data privacy in social networks is a growing concern that threatens to limit access to important inf...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
Differentially private GNNs (Graph Neural Networks) have been recently studied to provide high accur...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
The increasing collection and use of sensitive personal data raises important privacy concerns. Anot...
Information networks, such as social media and email net-works, often contain sensitive information....
Vast amounts of sensitive personal information are collected by companies, institutions and governme...
This dissertation is a study in the applications of algorithmic techniques to four specific problems ...
Differential privacy is known to protect against threats to validity incurred due to adaptive, or ex...