Differentially private data publishing and analysis: A survey

T Zhu, G Li, W Zhou, SY Philip - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Differential privacy is an essential and prevalent privacy model that has been widely
explored in recent decades. This survey provides a comprehensive and structured overview …

Reproducibility in learning

R Impagliazzo, R Lei, T Pitassi, J Sorrell - Proceedings of the 54th annual …, 2022 - dl.acm.org
We introduce the notion of a reproducible algorithm in the context of learning. A reproducible
learning algorithm is resilient to variations in its samples—with high probability, it returns the …

Dp-sniper: Black-box discovery of differential privacy violations using classifiers

B Bichsel, S Steffen, I Bogunovic… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
We present DP-Sniper, a practical black-box method that automatically finds violations of
differential privacy. DP-Sniper is based on two key ideas:(i) training a classifier to predict if …

Group and attack: Auditing differential privacy

J Lokna, A Paradis, DI Dimitrov, M Vechev - Proceedings of the 2023 …, 2023 - dl.acm.org
(ε, δ) differential privacy has seen increased adoption recently, especially in private machine
learning applications. While this privacy definition allows provably limiting the amount of …

[图书][B] Differential privacy and applications

T Zhu, G Li, W Zhou, SY Philip - 2017 - Springer
Corporations, organizations, and governments have collected, digitized, and stored
information in digital forms since the invention of computers, and the speed of such data …

Proving differential privacy via probabilistic couplings

G Barthe, M Gaboardi, B Grégoire, J Hsu… - Proceedings of the 31st …, 2016 - dl.acm.org
Over the last decade, differential privacy has achieved widespread adoption within the
privacy community. Moreover, it has attracted significant attention from the verification …

Orchard: Differentially private analytics at scale

E Roth, H Zhang, A Haeberlen, BC Pierce - 14th USENIX Symposium on …, 2020 - usenix.org
This paper presents Orchard, a system that can answer queries about sensitive data that is
held by millions of user devices, with strong differential privacy guarantees. Orchard …

LightDP: Towards automating differential privacy proofs

D Zhang, D Kifer - Proceedings of the 44th ACM SIGPLAN Symposium …, 2017 - dl.acm.org
The growing popularity and adoption of differential privacy in academic and industrial
settings has resulted in the development of increasingly sophisticated algorithms for …

Relational cost analysis

E Çiçek, G Barthe, M Gaboardi, D Garg… - ACM SIGPLAN …, 2017 - dl.acm.org
Establishing quantitative bounds on the execution cost of programs is essential in many
areas of computer science such as complexity analysis, compiler optimizations, security and …

Using bypass to tighten WCET estimates for multi-core processors with shared instruction caches

D Hardy, T Piquet, I Puaut - 2009 30th IEEE Real-Time Systems …, 2009 - ieeexplore.ieee.org
Multi-core chips have been increasingly adopted by the microprocessor industry. For real-
time systems to exploit multi-core architectures, it is required to obtain both tight and safe …