Collecting user data is crucial for advancing machine learning, social science, and government policies, but the privacy of the users whose data is being collected is a growing concern. Differential Privacy (DP)has emerged as the most standard notion for privacy protection with robust mathematical guarantees. Analyzing such massive amounts of data in a privacy-preserving manner motivates the need to study differentially-private algorithms that are also super-efficient. This thesis initiates a systematic study of differentially-private sublinear-time and sublinearspace algorithms. The contributions of this thesis are two-fold. First, we design some of the first differentially private sublinear algorithms for many fundamental problems. Second...
Differentially private algorithms allow large-scale data analytics while preserving user privacy. De...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
A differentially private algorithm adds randomness to its computations to ensure that its output rev...
Collecting user data is crucial for advancing machine learning, social science, and government polic...
We initiate a systematic study of algorithms that are both differentially-private and run in subline...
The exponential increase in the amount of available data makes taking advantage of them without viol...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
We study the problem of subsampling in differential privacy (DP), a question that is the centerpiece...
Given a graph, the densest subgraph problem asks for a set of vertices such that the average degree ...
Since the introduction of differential privacy to the field of privacy preserving data analysis, man...
This paper studies the problem of clustering in metric spaces while preserving the privacy of indivi...
We present DP-Sniper, a practical black-box method that automatically finds violations of differenti...
Differentially private algorithms allow large-scale data analytics while preserving user privacy. De...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
A differentially private algorithm adds randomness to its computations to ensure that its output rev...
Collecting user data is crucial for advancing machine learning, social science, and government polic...
We initiate a systematic study of algorithms that are both differentially-private and run in subline...
The exponential increase in the amount of available data makes taking advantage of them without viol...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
In this thesis, we study when algorithmic tasks can be performed on sensitive data while protecting ...
We develop a framework for efficiently transforming certain approximation algorithms into differenti...
Differential privacy is the now de facto industry standard for ensuring privacy while publicly relea...
We study the problem of subsampling in differential privacy (DP), a question that is the centerpiece...
Given a graph, the densest subgraph problem asks for a set of vertices such that the average degree ...
Since the introduction of differential privacy to the field of privacy preserving data analysis, man...
This paper studies the problem of clustering in metric spaces while preserving the privacy of indivi...
We present DP-Sniper, a practical black-box method that automatically finds violations of differenti...
Differentially private algorithms allow large-scale data analytics while preserving user privacy. De...
Computing technologies today have made it much easier to gather personal data, ranging from GPS loca...
A differentially private algorithm adds randomness to its computations to ensure that its output rev...