We initiate a systematic study of algorithms that are both differentially-private and run in sublinear time for several problems in which the goal is to estimate natural graph parameters. Our main result is a differentially-private (1+?)-approximation algorithm for the problem of computing the average degree of a graph, for every ? > 0. The running time of the algorithm is roughly the same (for sparse graphs) as its non-private version proposed by Goldreich and Ron (Sublinear Algorithms, 2005). We also obtain the first differentially-private sublinear-time approximation algorithms for the maximum matching size and the minimum vertex cover size of a graph. An overarching technique we employ is the notion of coupled global sensitivity of rand...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Privacy-preserving protocols for matchings on general graphs can be used for applications such as on...
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Collecting user data is crucial for advancing machine learning, social science, and government polic...
The exponential increase in the amount of available data makes taking advantage of them without viol...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Given a graph, the densest subgraph problem asks for a set of vertices such that the average degree ...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
Releasing the exact degree sequence of a graph for analysis may violate privacy. However, the degree...
We propose a (epsilon, delta)-differentially private mechanism that, given an input graph G with n v...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
We consider classification of graphs using graph kernels under differential privacy. We develop diff...
AbstractFor a given graph G over n vertices, let OPTG denote the size of an optimal solution in G of...
We design algorithms for fitting a high-dimensional statistical model to a large, sparse network wit...
International audienceFor a graph G , let Z(G,λ)Z(G,λ) be the partition function of the monomer–dim...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Privacy-preserving protocols for matchings on general graphs can be used for applications such as on...
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...
Collecting user data is crucial for advancing machine learning, social science, and government polic...
The exponential increase in the amount of available data makes taking advantage of them without viol...
Presented on November 7, 2016 at 11:00 a.m. in the Klaus Advanced Computing Building, Room 1116ESofy...
Given a graph, the densest subgraph problem asks for a set of vertices such that the average degree ...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
Releasing the exact degree sequence of a graph for analysis may violate privacy. However, the degree...
We propose a (epsilon, delta)-differentially private mechanism that, given an input graph G with n v...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
We consider classification of graphs using graph kernels under differential privacy. We develop diff...
AbstractFor a given graph G over n vertices, let OPTG denote the size of an optimal solution in G of...
We design algorithms for fitting a high-dimensional statistical model to a large, sparse network wit...
International audienceFor a graph G , let Z(G,λ)Z(G,λ) be the partition function of the monomer–dim...
Abstract. Enabling accurate analysis of social network data while preserving differential privacy ha...
Privacy-preserving protocols for matchings on general graphs can be used for applications such as on...
Abstract: We propose methods to release and analyze synthetic graphs in order to protect privacy of ...