We propose the Target Charging Technique (TCT), a unified privacy
analys...
We show a new PRG construction fooling depth-d, size-m 𝖠𝖢^0
circuits wit...
Composition theorems are general and powerful tools that facilitate priv...
The problem of learning threshold functions is a fundamental one in mach...
In the Element Distinctness problem, one is given an array a_1,…, a_n
of...
An interactive mechanism is an algorithm that stores a data set and answ...
CountSketch is a popular dimensionality reduction technique that maps ve...
Recent years have witnessed a boom of connected medical devices, which b...