We study how to release summary statistics on a data stream subject to the constraint of differential privacy. In particular, we focus on releasing the family of symmetric norms, which are invariant under sign-flips and coordinate-wise permutations on an input data stream and include $L_p$ norms, $k$-support norms, top-$k$ norms, and the box norm as special cases. Although it may be possible to design and analyze a separate mechanism for each symmetric norm, we propose a general parametrizable framework that differentially privately releases a number of sufficient statistics from which the approximation of all symmetric norms can be simultaneously computed. Our framework partitions the coordinates of the underlying frequency vector into dif...
We study personalization of supervised learning with user-level differential privacy. Consider a set...
Part 3: Security AnalysisInternational audienceOriginally proposed for privacy protection in the con...
Many large databases of personal information currently exist in the hands of corporations, nonprofit...
We study how to release summary statistics on a data stream subject to the constraint of differentia...
We study the problem of publishing a stream of real-valued data satisfying differential privacy (DP)...
Data is considered the “new oil” in the information society and digital economy. While many commerci...
This work studies formal utility and privacy guarantees for a simple multiplicative database transfo...
Differential privacy, introduced by Dwork et al. in 2006, has become the benchmark for data privacy ...
Privacy guarantees of a privacy-enhancing system have to be robust against thousands of observations...
We consider a federated data analytics problem in which a server coordinates the collaborative data ...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy m...
Data is considered the "new oil" in the information society and digital economy. While many commerci...
Differential privacy is a cryptographically-motivated approach to privacy that has become a very act...
We study the central problem in data privacy: how to share data with an analyst while providing bot...
We study personalization of supervised learning with user-level differential privacy. Consider a set...
Part 3: Security AnalysisInternational audienceOriginally proposed for privacy protection in the con...
Many large databases of personal information currently exist in the hands of corporations, nonprofit...
We study how to release summary statistics on a data stream subject to the constraint of differentia...
We study the problem of publishing a stream of real-valued data satisfying differential privacy (DP)...
Data is considered the “new oil” in the information society and digital economy. While many commerci...
This work studies formal utility and privacy guarantees for a simple multiplicative database transfo...
Differential privacy, introduced by Dwork et al. in 2006, has become the benchmark for data privacy ...
Privacy guarantees of a privacy-enhancing system have to be robust against thousands of observations...
We consider a federated data analytics problem in which a server coordinates the collaborative data ...
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Comput...
Differential privacy mechanisms can offer a trade-off between privacy and utility by using privacy m...
Data is considered the "new oil" in the information society and digital economy. While many commerci...
Differential privacy is a cryptographically-motivated approach to privacy that has become a very act...
We study the central problem in data privacy: how to share data with an analyst while providing bot...
We study personalization of supervised learning with user-level differential privacy. Consider a set...
Part 3: Security AnalysisInternational audienceOriginally proposed for privacy protection in the con...
Many large databases of personal information currently exist in the hands of corporations, nonprofit...