Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

On learning from label proportions

FX Yu, K Choromanski, S Kumar, T Jebara… - arXiv preprint arXiv …, 2014 - arxiv.org
Learning from Label Proportions (LLP) is a learning setting, where the training data is
provided in groups, or" bags", and only the proportion of each class in each bag is known …

Efficient Approximation Algorithms for Weighted -Matching

A Khan, A Pothen, M Mostofa Ali Patwary… - SIAM Journal on …, 2016 - SIAM
We describe a half-approximation algorithm, b-Suitor, for computing a b-Matching of
maximum weight in a graph with weights on the edges. b-Matching is a generalization of the …

Variability in the execution of multimedia applications and implications for architecture

CJ Hughes, P Kaul, SV Adve, R Jain, C Park… - ACM SIGARCH …, 2001 - dl.acm.org
Multimedia applications are an increasingly important workload for general-purpose
processors. This paper analyzes frame-level execution time variability for several multimedia …

Approximation algorithms in combinatorial scientific computing

A Pothen, SM Ferdous, F Manne - Acta Numerica, 2019 - cambridge.org
We survey recent work on approximation algorithms for computing degree-constrained
subgraphs in graphs and their applications in combinatorial scientific computing. The …

Privacy implications of shuffling

C Meehan, AR Chowdhury, K Chaudhuri… - … Conference on Learning …, 2022 - openreview.net
\ldp deployments are vulnerable to inference attacks as an adversary can link the noisy
responses to their identity and subsequently, auxiliary information using the\textit {order} of …

Differentially-and non-differentially-private random decision trees

M Bojarski, A Choromanska, K Choromanski… - arXiv preprint arXiv …, 2014 - arxiv.org
We consider supervised learning with random decision trees, where the tree construction is
completely random. The method is popularly used and works well in practice despite the …

k-Anonymization by freeform generalization

K Doka, M Xue, D Tsoumakos, P Karras - Proceedings of the 10th ACM …, 2015 - dl.acm.org
Syntactic data anonymization strives to (i) ensure that an adversary cannot identify an
individual's record from published attributes with high probability, and (ii) provide high data …

Designing scalable b-matching algorithms on distributed memory multiprocessors by approximation

A Khan, A Pothen, MMA Patwary… - SC'16: Proceedings …, 2016 - ieeexplore.ieee.org
A b-MATCHING is a subset of edges M such that at most b (v) edges in M are incident on
each vertex v, where b (v) is specified. We present a distributed-memory parallel algorithm, b …

A New 3/2-Approximation Algorithm for the b-Edge Cover Problem

A Khan, A Pothen - 2016 Proceedings of the Seventh SIAM Workshop on …, 2016 - SIAM
We describe a 3/2-approximation algorithm, LSE, for computing ab-Edge Cover of minimum
weight in a graph with weights on the edges. The b-Edge Cover problem is a generalization …