Mechanism design via differential privacy

F McSherry, K Talwar - 48th Annual IEEE Symposium on …, 2007 - ieeexplore.ieee.org
… We introduce the use of differential privacy as a solution concept … differential privacy and
generalizes the additive noise mechanisms of [9, 15]. Along with the proof of differential privacy, …

More than privacy: Adopting differential privacy in game-theoretic mechanism design

L Zhang, T Zhu, P Xiong, W Zhou, PS Yu - ACM Computing Surveys …, 2021 - dl.acm.org
… We not only focused on the privacy guarantee promised by differential privacy, … differential
privacy brings about. In addition, we provided a comprehensive review of differential privacy in …

On the relation between identifiability, differential privacy, and mutual-information privacy

W Wang, L Ying, J Zhang - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
… achieves the best mutualinformation privacy. Based on these … information optimal mechanism
satisfies ϵdifferential privacy … of privacy, namely identifiability and differential privacy, and …

Approximately optimal mechanism design via differential privacy

K Nissim, R Smorodinsky, M Tennenholtz - Proceedings of the 3rd …, 2012 - dl.acm.org
Differential privacy stipulates that the influence of any contributor to the computation is …
connection between differential privacy and mechanism design, where differential privacy is used …

Differential privacy: on the trade-off between utility and information leakage

MS Alvim, ME Andrés, K Chatzikokolakis… - Formal Aspects of …, 2012 - Springer
… in terms of an informationtheoretic channel, and we compare the notion of differential privacy
with that of min-entropy leakage. We show that differential privacy implies a bound on the …

Differential privacy in control and network systems

J Cortés, GE Dullerud, S Han, J Le Ny… - 2016 IEEE 55th …, 2016 - ieeexplore.ieee.org
… enforcing differential privacy, a state-ofthe-art definition of privacy … against adversaries with
arbitrary side information. We discuss in … multiple agents under differential privacy constraints. …

" I need a better description": An Investigation Into User Expectations For Differential Privacy

R Cummings, G Kaptchuk, EM Redmiles - Proceedings of the 2021 ACM …, 2021 - dl.acm.org
… of information leaks against which differential privacy protects and are more willing to share
their private information … Additionally, we find that the ways in which differential privacy is …

[图书][B] Differential privacy and applications

T Zhu, G Li, W Zhou, SY Philip - 2017 - Springer
… the topic of differential privacy or only focus on the theoretical analysis of differential privacy.
… , methods, algorithms, and analysis on differential privacy, this book presents these difficult …

Differential privacy: Now it's getting personal

H Ebadi, D Sands, G Schneider - Acm Sigplan Notices, 2015 - dl.acm.org
… Personalised Differential Privacy This paper addresses … of differential privacy called
personalised differential privacy (PDP) which permits each individual to have a personalised privacy

Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
… CPSs data privacy. In this paper, we present a comprehensive survey of differential privacy
… In particular, we survey the application and implementation of differential privacy in four …