Calibrating noise to sensitivity in private data analysis C Dwork, F McSherry, K Nissim, A Smith Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006 | 9187 | 2006 |
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Y Dodis, L Reyzin, A Smith Advances In Cryptology-EUROCRYPT 2004: International Conference On The …, 2004 | 4273* | 2004 |
What can we learn privately? SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008 | 1560 | 2008 |
Smooth sensitivity and sampling in private data analysis K Nissim, S Raskhodnikova, A Smith Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007 | 1377 | 2007 |
Private empirical risk minimization: Efficient algorithms and tight error bounds R Bassily, A Smith, A Thakurta 2014 IEEE 55th annual symposium on foundations of computer science, 464-473, 2014 | 1042 | 2014 |
Local, private, efficient protocols for succinct histograms R Bassily, A Smith Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015 | 511 | 2015 |
Composition attacks and auxiliary information in data privacy SR Ganta, SP Kasiviswanathan, A Smith Proceeding of the 14th ACM SIGKDD international conference on Knowledge …, 2008 | 506 | 2008 |
Private convex empirical risk minimization and high-dimensional regression D Kifer, A Smith, A Thakurta Conference on Learning Theory, 25.1-25.40, 2012 | 451 | 2012 |
Analyzing graphs with node differential privacy SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 396 | 2013 |
Toward privacy in public databases S Chawla, C Dwork, F McSherry, A Smith, H Wee Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 384 | 2005 |
Distributed differential privacy via shuffling A Cheu, A Smith, J Ullman, D Zeber, M Zhilyaev Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 370 | 2019 |
Authentication of quantum messages H Barnum, C Crépeau, D Gottesman, A Smith, A Tapp The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002 | 369 | 2002 |
Secure remote authentication using biometric data X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 344 | 2005 |
Differential privacy for statistics: What we know and what we want to learn C Dwork, A Smith Journal of Privacy and Confidentiality 1 (2), 2010 | 342 | 2010 |
Robust fuzzy extractors and authenticated key agreement from close secrets Y Dodis, J Katz, L Reyzin, A Smith Advances in Cryptology-CRYPTO 2006, 232-250, 2006 | 329* | 2006 |
Leftover hashing against quantum side information M Tomamichel, C Schaffner, A Smith, R Renner IEEE Transactions on Information Theory 57 (8), 5524-5535, 2011 | 325 | 2011 |
Private analysis of graph structure V Karwa, S Raskhodnikova, A Smith, G Yaroslavtsev Proceedings of the VLDB Endowment 4 (11), 1146-1157, 2011 | 322 | 2011 |
Privacy-preserving statistical estimation with optimal convergence rates A Smith Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 319 | 2011 |
Discovering frequent patterns in sensitive data R Bhaskar, S Laxman, A Smith, A Thakurta Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010 | 315 | 2010 |
Algorithmic stability for adaptive data analysis R Bassily, K Nissim, A Smith, T Steinke, U Stemmer, J Ullman Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 306 | 2016 |