The Multiplicative Weights Update Method: a Meta-Algorithm and Applications, Theory of Computing, pp.121-164, 2012. ,
UCI Machine Learning Repository, 2013. ,
Characterizing the sample complexity of private learners, Proceedings of the 4th conference on Innovations in Theoretical Computer Science, ITCS '13, pp.97-110, 2013. ,
DOI : 10.1145/2422436.2422450
Practical privacy, Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '05, pp.128-138, 2005. ,
DOI : 10.1145/1065167.1065184
A learning theory approach to noninteractive database privacy, Journal of the ACM, vol.60, issue.2, 2013. ,
DOI : 10.1145/2450142.2450148
URL : http://www.cs.cmu.edu/afs/cs/Web/People/avrim/Papers/privacy-full.pdf
Sample Complexity Bounds for Differentially Private Learning, Journal of Machine Learning Research, vol.19, pp.155-186, 2011. ,
Privacy-preserving logistic regression, Conference on Neural Information Processing Systems (NIPS), pp.289-296, 2008. ,
Differentially private empirical risk minimization, Journal of Machine Learning Research, vol.12, pp.1069-1109, 2011. ,
Near-optimal differentially private principal components, Conference on Neural Information Processing Systems (NIPS), pp.998-1006, 2012. ,
A Stability-based Validation Procedure for Differentially Private Machine Learning URL http://papers.nips.cc/paper/5014-a-stability-based-validation- procedure-for-differentially-private-machine-learning, pp.2652-2660, 2013. ,
Local privacy and statistical minimax rates, IEEE Symposium on Foundations of Computer Science (FOCS), 2013. ,
DOI : 10.1109/allerton.2013.6736718
URL : http://www.cs.berkeley.edu/~jduchi/projects/DuchiJoWa13_focs.pdf
Calibrating noise to sensitivity in private data analysis, IACR Theory of Cryptography Conference (TCC), pp.265-284, 2006. ,
DOI : 10.29012/jpc.v7i3.405
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1139&context=jpc
On the complexity of differentially private data release, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.381-390, 2009. ,
DOI : 10.1145/1536414.1536467
Using Convex Relaxations for Efficiently and Privately Releasing Marginals, Annual Symposium on Computational Geometry, SOCG'14, p.1385, 1308. ,
DOI : 10.1145/2582112.2582123
Boosting and Differential Privacy, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.51-60, 2010. ,
DOI : 10.1109/FOCS.2010.12
URL : http://www.mit.edu/~rothblum/papers/pboosting.pdf
Game theory, on-line prediction and boosting, Proceedings of the ninth annual conference on Computational learning theory , COLT '96, pp.325-332, 1996. ,
DOI : 10.1145/238061.238163
URL : http://dl.acm.org/ft_gateway.cfm?id=238163&type=pdf
Iterative Constructions and Private Data Release, IACR Theory of Cryptography Conference (TCC), pp.339-356, 2012. ,
DOI : 10.1007/978-3-642-28914-9_19
URL : http://www.cis.upenn.edu/~aaroth/Papers/IDCs.pdf
A Simple and Practical Algorithm for Differentially Private Data Release, Conference on Neural Information Processing Systems (NIPS), pp.2348-2356, 2012. ,
A Multiplicative Weights Mechanism for Privacy-Preserving Data Analysis, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.61-70, 2010. ,
DOI : 10.1109/FOCS.2010.85
URL : http://www.cs.princeton.edu/%7Emhardt/pub/HR10.pdf
Differential privacy for the analyst via private equilibrium computation, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.341-350, 2013. ,
DOI : 10.1145/2488608.2488651
What Can We Learn Privately?, SIAM Journal on Computing, vol.40, issue.3, pp.793-826, 2011. ,
DOI : 10.1137/090756090
URL : http://www.cse.psu.edu/~asmith/privacy598/papers/klnrs08.pdf
Efficient noise-tolerant learning from statistical queries, Journal of the ACM, vol.45, issue.6, pp.983-1006, 1998. ,
DOI : 10.1145/293347.293351
URL : http://www.cs.iastate.edu/~honavar/noise-pac.pdf
Private convex empirical risk minimization and high-dimensional regression, Journal of Machine Learning Research, vol.1, p.41, 2012. ,
Optimizing linear counting queries under differential privacy, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, pp.123-134, 2010. ,
DOI : 10.1145/1807085.1807104
URL : http://arxiv.org/pdf/0912.4742.pdf
An adaptive mechanism for accurate query answering under differential privacy, Proceedings of the VLDB Endowment, vol.5, issue.6, pp.514-525, 2012. ,
DOI : 10.14778/2168651.2168653
URL : http://arxiv.org/pdf/1202.3807
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
The geometry of differential privacy, Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, STOC '13, pp.351-360, 2013. ,
DOI : 10.1145/2488608.2488652
Interactive privacy via the median mechanism, Proceedings of the 42nd ACM symposium on Theory of computing, STOC '10, pp.765-774 ,
DOI : 10.1145/1806689.1806794
URL : http://www.cs.cmu.edu/%7Ealroth/Papers/onlineprivacy.pdf
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning (Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings, Journal of Privacy and Confidentiality Conference on Neural Information Processing Systems (NIPS), pp.2733-2741, 2012. ,
Answering n 2+o(1) counting queries with differential privacy is hard, ACM SIGACT Symposium on Theory of Computing (STOC), pp.361-370, 2013. ,
DOI : 10.1145/2488608.2488653
PCPs and the Hardness of Generating Private Synthetic Data, IACR Theory of Cryptography Conference (TCC), pp.400-416, 2011. ,
DOI : 10.1007/978-3-642-19571-6_24
Accurate and efficient private release of datacubes and contingency tables, 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp.745-756, 2013. ,
DOI : 10.1109/ICDE.2013.6544871
PrivBayes: Private Data Release via Bayesian Networks, ACM SIGMOD International Conference on Management of Data (SIGMOD), 2014. ,