Reproducibility in learning
R Impagliazzo, R Lei, T Pitassi, J Sorrell - Proceedings of the 54th annual …, 2022 - dl.acm.org
We introduce the notion of a reproducible algorithm in the context of learning. A reproducible
learning algorithm is resilient to variations in its samples—with high probability, it returns the …
learning algorithm is resilient to variations in its samples—with high probability, it returns the …
A randomized approach to tight privacy accounting
Bounding privacy leakage over compositions, ie, privacy accounting, is a key challenge in
differential privacy (DP). However, the privacy parameter ($\varepsilon $ or $\delta $) is often …
differential privacy (DP). However, the privacy parameter ($\varepsilon $ or $\delta $) is often …
Deciding differential privacy for programs with finite inputs and outputs
Differential privacy is a de facto standard for statistical computations over databases that
contain private data. Its main and rather surprising strength is to guarantee individual privacy …
contain private data. Its main and rather surprising strength is to guarantee individual privacy …
majority-3sat (and related problems) in polynomial time
S Akmal, R Williams - 2021 IEEE 62nd Annual Symposium on …, 2022 - ieeexplore.ieee.org
Majority-SAT (aka MAJ-SAT) is the problem of determining whether an input n-variable
formula in conjunctive normal form (CNF) has at least 2^(n-1) satisfying assignments …
formula in conjunctive normal form (CNF) has at least 2^(n-1) satisfying assignments …
Certifying Private Probabilistic Mechanisms
ZR Bell, S Goldwasser, MP Kim, JL Watson - Annual International …, 2024 - Springer
In past years, entire research communities have arisen to address concerns of privacy and
fairness in data analysis. At present, however, the public must trust that institutions will re …
fairness in data analysis. At present, however, the public must trust that institutions will re …
The complexity of verifying boolean programs as differentially private
We study the complexity of the problem of verifying differential privacy for while-like
programs working over boolean values and making probabilistic choices. Programs in this …
programs working over boolean values and making probabilistic choices. Programs in this …
Deciding Differential Privacy of Online Algorithms with Multiple Variables
We consider the problem of checking the differential privacy of online randomized
algorithms that process a stream of inputs and produce outputs corresponding to each input …
algorithms that process a stream of inputs and produce outputs corresponding to each input …
Synthesizing Tight Privacy and Accuracy Bounds via Weighted Model Counting
Programmatically generating tight differential privacy (DP) bounds is a hard problem. Two
core challenges are (1) finding expressive, compact, and efficient encodings of the …
core challenges are (1) finding expressive, compact, and efficient encodings of the …
Verifying pufferfish privacy in hidden Markov models
D Liu, BY Wang, L Zhang - … on Verification, Model Checking, and Abstract …, 2022 - Springer
Pufferfish is a Bayesian privacy framework for designing and analyzing privacy mechanisms.
It refines differential privacy, the current gold standard in data privacy, by allowing explicit …
It refines differential privacy, the current gold standard in data privacy, by allowing explicit …
On linear time decidability of differential privacy for programs with unbounded inputs
We introduce an automata model for describing interesting classes of differential privacy
mechanisms/algorithms that include known mechanisms from the literature. These automata …
mechanisms/algorithms that include known mechanisms from the literature. These automata …