Sciweavers

455 search results - page 4 / 91
» Differential Privacy in New Settings
Sort
View
SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
13 years 14 hour ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
EDBT
2010
ACM
181views Database» more  EDBT 2010»
14 years 8 months ago
Private record matching using differential privacy
Private matching between datasets owned by distinct parties is a challenging problem with several applications. Private matching allows two parties to identify the records that ar...
Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, Eli...
PET
2012
Springer
12 years 12 months ago
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams
We consider applications scenarios where an untrusted aggregator wishes to continually monitor the heavy-hitters across a set of distributed streams. Since each stream can contain ...
T.-H. Hubert Chan, Mingfei Li, Elaine Shi, Wenchan...
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
ESORICS
2004
Springer
15 years 3 months ago
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
As network traffic increases, the problems associated with monitoring and analyzing the traffic on high speed networks become increasingly difficult. In this paper, we introduce a ...
John McHugh