We view the penalty algorithm of Ceperley and Dewing (J Chem Phys 110(20):9812–9820, 1999), a Markov chain Monte Carlo algorithm for Bayesian inference, in the context of data privacy. Specifically, we studied differential privacy of the penalty algorithm and advocate its use for data privacy. The algorithm can be made differentially private while remaining exact in the sense that its target distribution is the true posterior distribution conditioned on the private data. We also show that in a model with independent observations the algorithm has desirable convergence and privacy properties that scale with data size. Two special cases are also investigated and privacy-preserving schemes are proposed for those cases: (i) Data are distributed...
Differential privacy formalises privacy-preserving mechanisms that provide access to a database. Can...
The protection of private and sensitive data is an important problem of increasing interest due to t...
An individual's personal information is gathered by a multitude of different data collectors through...
We view the penalty algorithm of Ceperley and Dewing (J Chem Phys 110(20):9812–9820, 1999), a Markov...
Differential privacy has over the past decade become a widely used framework for privacy-preserving ...
Differential privacy is one recent framework for analyzing and quantifying the amount of privacy los...
This paper concerns differentially private Bayesian estimation of the parameters of a population dis...
We study how to communicate findings of Bayesian inference to third parties, while preserving the st...
International audienceWe study how to communicate findings of Bayesian inference to third parties, w...
Bayesian inference has great promise for the privacy-preserving analysis of sensitive data, as poste...
International audienceDifferential privacy formalises privacy-preserving mechanisms that provide acc...
This dissertation studies the trade-off between differential privacy and statistical accuracy in par...
239 pagesIn modern settings of data analysis, we may be running our algorithms on datasets that are ...
Producing statistics that respect the privacy of the samples while still maintaining their accuracy ...
This paper discusses how two classes of approximate computation algorithms can be adapted, in a modu...
Differential privacy formalises privacy-preserving mechanisms that provide access to a database. Can...
The protection of private and sensitive data is an important problem of increasing interest due to t...
An individual's personal information is gathered by a multitude of different data collectors through...
We view the penalty algorithm of Ceperley and Dewing (J Chem Phys 110(20):9812–9820, 1999), a Markov...
Differential privacy has over the past decade become a widely used framework for privacy-preserving ...
Differential privacy is one recent framework for analyzing and quantifying the amount of privacy los...
This paper concerns differentially private Bayesian estimation of the parameters of a population dis...
We study how to communicate findings of Bayesian inference to third parties, while preserving the st...
International audienceWe study how to communicate findings of Bayesian inference to third parties, w...
Bayesian inference has great promise for the privacy-preserving analysis of sensitive data, as poste...
International audienceDifferential privacy formalises privacy-preserving mechanisms that provide acc...
This dissertation studies the trade-off between differential privacy and statistical accuracy in par...
239 pagesIn modern settings of data analysis, we may be running our algorithms on datasets that are ...
Producing statistics that respect the privacy of the samples while still maintaining their accuracy ...
This paper discusses how two classes of approximate computation algorithms can be adapted, in a modu...
Differential privacy formalises privacy-preserving mechanisms that provide access to a database. Can...
The protection of private and sensitive data is an important problem of increasing interest due to t...
An individual's personal information is gathered by a multitude of different data collectors through...