Synthetic data generation methods, and in particular, private synthetic ...
For almost 20 years, the Wikimedia Foundation has been publishing statis...
When a database is protected by Differential Privacy (DP), its usability...
Most differentially private mechanisms are designed for the use of a sin...
In this short paper, we outline the design of Tumult Analytics, a Python...
The purpose of this paper is to guide interpretation of the semantic pri...
Differential privacy (DP) is the state-of-the-art and rigorous notion of...
The Census TopDown Algorithm (TDA) is a disclosure avoidance system usin...
In this paper, we consider secure outsourced growing databases that supp...
This work presents a systematic benchmark of differentially private synt...
While the entire field of privacy preserving data analytics is focused o...
This article describes a proposed differentially private (DP) algorithms...
In this work we describe the High-Dimensional Matrix Mechanism (HDMM), a...
Joint distribution estimation of a dataset under differential privacy is...
In this paper, we have introduced a new type of leakage associated with
...
The generation of synthetic data is useful in multiple aspects, from tes...
Large organizations that collect data about populations (like the US Cen...
Differential privacy (DP) has arisen as the state-of-the-art metric for
...
Local sensitivity of a query Q given a database instance D, i.e. how muc...
In this work we explore the problem of answering a set of sum queries un...
Differential privacy, a notion of algorithmic stability, is a gold stand...
Data collected about individuals is regularly used to make decisions tha...
Differential privacy has steadily become the de-facto standard for achie...
A private data federation is a set of autonomous databases that share a
...
The adoption of differential privacy is growing but the complexity of
de...
Differentially private algorithms for answering sets of predicate counti...
We consider the problem of privately releasing a class of queries that w...
Consider the problem of estimating, for every integer j, the number of
h...
Data cleaning is the process of detecting and repairing inaccurate or co...
In this paper, we study the problem of privacy-preserving data sharing,
...