Utility-privacy tradeoffs in databases: An information-theoretic approach

L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …

Linear dependent types for differential privacy

M Gaboardi, A Haeberlen, J Hsu, A Narayan… - Proceedings of the 40th …, 2013 - dl.acm.org
Differential privacy offers a way to answer queries about sensitive information while
providing strong, provable privacy guarantees, ensuring that the presence or absence of a …

Analyzing privacy leakage in machine learning via multiple hypothesis testing: A lesson from fano

C Guo, A Sablayrolles… - … Conference on Machine …, 2023 - proceedings.mlr.press
Differential privacy (DP) is by far the most widely accepted framework for mitigating privacy
risks in machine learning. However, exactly how small the privacy parameter $\epsilon …

Privacy games: Optimal user-centric data obfuscation

R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …

Semidefinite programming approach to Gaussian sequential rate-distortion trade-offs

T Tanaka, KKK Kim, PA Parrilo… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Sequential rate-distortion (SRD) theory provides a framework for studying the fundamental
trade-off between data-rate and data-quality in real-time communication systems. In this …

An operational measure of information leakage

I Issa, S Kamath, AB Wagner - 2016 Annual Conference on …, 2016 - ieeexplore.ieee.org
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …

SoK: Differential privacy as a causal property

MC Tschantz, S Sen, A Datta - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present formal models of the associative and causal views of differential privacy. Under
the associative view, the possibility of dependencies between data points precludes a …

Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs

G Barthe, F Olmedo - International Colloquium on Automata, Languages …, 2013 - Springer
Abstract f-divergences form a class of measures of distance between probability
distributions; they are widely used in areas such as information theory and signal …

Expressing information flow properties

E Kozyri, S Chong, AC Myers - Foundations and Trends® in …, 2022 - nowpublishers.com
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …

BLIP: non-interactive differentially-private similarity computation on bloom filters

M Alaggan, S Gambs, AM Kermarrec - Symposium on Self-Stabilizing …, 2012 - Springer
In this paper, we consider the scenario in which the profile of a user is represented in a
compact way, as a Bloom filter, and the main objective is to privately compute in a distributed …