关注
Adam Smith
Adam Smith
Professor of Computer Science, Boston University
在 bu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Calibrating noise to sensitivity in private data analysis
C Dwork, F McSherry, K Nissim, A Smith
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
91872006
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
Advances In Cryptology-EUROCRYPT 2004: International Conference On The …, 2004
4273*2004
What can we learn privately?
SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith
Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008
15602008
Smooth sensitivity and sampling in private data analysis
K Nissim, S Raskhodnikova, A Smith
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
13772007
Private empirical risk minimization: Efficient algorithms and tight error bounds
R Bassily, A Smith, A Thakurta
2014 IEEE 55th annual symposium on foundations of computer science, 464-473, 2014
10422014
Local, private, efficient protocols for succinct histograms
R Bassily, A Smith
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
5112015
Composition attacks and auxiliary information in data privacy
SR Ganta, SP Kasiviswanathan, A Smith
Proceeding of the 14th ACM SIGKDD international conference on Knowledge …, 2008
5062008
Private convex empirical risk minimization and high-dimensional regression
D Kifer, A Smith, A Thakurta
Conference on Learning Theory, 25.1-25.40, 2012
4512012
Analyzing graphs with node differential privacy
SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
3962013
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
3842005
Distributed differential privacy via shuffling
A Cheu, A Smith, J Ullman, D Zeber, M Zhilyaev
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
3702019
Authentication of quantum messages
H Barnum, C Crépeau, D Gottesman, A Smith, A Tapp
The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002
3692002
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
3442005
Differential privacy for statistics: What we know and what we want to learn
C Dwork, A Smith
Journal of Privacy and Confidentiality 1 (2), 2010
3422010
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Advances in Cryptology-CRYPTO 2006, 232-250, 2006
329*2006
Leftover hashing against quantum side information
M Tomamichel, C Schaffner, A Smith, R Renner
IEEE Transactions on Information Theory 57 (8), 5524-5535, 2011
3252011
Private analysis of graph structure
V Karwa, S Raskhodnikova, A Smith, G Yaroslavtsev
Proceedings of the VLDB Endowment 4 (11), 1146-1157, 2011
3222011
Privacy-preserving statistical estimation with optimal convergence rates
A Smith
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
3192011
Discovering frequent patterns in sensitive data
R Bhaskar, S Laxman, A Smith, A Thakurta
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
3152010
Algorithmic stability for adaptive data analysis
R Bassily, K Nissim, A Smith, T Steinke, U Stemmer, J Ullman
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
3062016
系统目前无法执行此操作,请稍后再试。
文章 1–20