Detecting violations of differential privacy Z Ding, Y Wang, G Wang, D Zhang, D Kifer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 158 | 2018 |
Proving differential privacy with shadow execution Y Wang, Z Ding, G Wang, D Kifer, D Zhang Proceedings of the 40th ACM SIGPLAN Conference on Programming Language …, 2019 | 51 | 2019 |
Free gap estimates from the exponential mechanism, sparse vector, noisy max and related algorithms Z Ding, Y Wang, Y Xiao, G Wang, D Zhang, D Kifer The VLDB Journal 32 (1), 23-48, 2023 | 11 | 2023 |
Answering private linear queries adaptively using the common mechanism Y Xiao, G Wang, D Zhang, D Kifer arXiv preprint arXiv:2212.00135, 2022 | 6 | 2022 |
A Floating-Point Secure Implementation of the Report Noisy Max with Gap Mechanism Z Ding, J Durrell, D Kifer, P Protivash, G Wang, Y Wang, Y Xiao, D Zhang arXiv preprint arXiv:2308.08057, 2023 | 3 | 2023 |