Utility-privacy tradeoffs in databases: An information-theoretic approach
L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …
guarantees is an important unsolved problem. This problem drives the need for an analytical …
Linear dependent types for differential privacy
Differential privacy offers a way to answer queries about sensitive information while
providing strong, provable privacy guarantees, ensuring that the presence or absence of a …
providing strong, provable privacy guarantees, ensuring that the presence or absence of a …
Analyzing privacy leakage in machine learning via multiple hypothesis testing: A lesson from fano
C Guo, A Sablayrolles… - … Conference on Machine …, 2023 - proceedings.mlr.press
Differential privacy (DP) is by far the most widely accepted framework for mitigating privacy
risks in machine learning. However, exactly how small the privacy parameter $\epsilon …
risks in machine learning. However, exactly how small the privacy parameter $\epsilon …
Privacy games: Optimal user-centric data obfuscation
R Shokri - arXiv preprint arXiv:1402.3426, 2014 - arxiv.org
In this paper, we design user-centric obfuscation mechanisms that impose the minimum
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
utility loss for guaranteeing user's privacy. We optimize utility subject to a joint guarantee of …
Semidefinite programming approach to Gaussian sequential rate-distortion trade-offs
Sequential rate-distortion (SRD) theory provides a framework for studying the fundamental
trade-off between data-rate and data-quality in real-time communication systems. In this …
trade-off between data-rate and data-quality in real-time communication systems. In this …
An operational measure of information leakage
Given two discrete random variables X and Y, an operational approach is undertaken to
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
quantify the “leakage” of information from X to Y. The resulting measure ℒ (X→ Y) is called …
SoK: Differential privacy as a causal property
We present formal models of the associative and causal views of differential privacy. Under
the associative view, the possibility of dependencies between data points precludes a …
the associative view, the possibility of dependencies between data points precludes a …
Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs
Abstract f-divergences form a class of measures of distance between probability
distributions; they are widely used in areas such as information theory and signal …
distributions; they are widely used in areas such as information theory and signal …
Expressing information flow properties
Industries and governments are increasingly compelled by regulations and public pressure
to handle sensitive information responsibly. Regulatory requirements and user expectations …
to handle sensitive information responsibly. Regulatory requirements and user expectations …
BLIP: non-interactive differentially-private similarity computation on bloom filters
In this paper, we consider the scenario in which the profile of a user is represented in a
compact way, as a Bloom filter, and the main objective is to privately compute in a distributed …
compact way, as a Bloom filter, and the main objective is to privately compute in a distributed …