Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,251,255 papers from all fields of science
Search
Sign In
Create Free Account
Exponential mechanism (differential privacy)
The exponential mechanism is a technique for designing differentially private algorithms developed by Frank McSherry and Kunal Talwar. Differential…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Differential privacy
Statistical classification
VC dimension
Broader (1)
Information privacy
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Incorporating Differential Privacy Protection to a Basic Recommendation Engine
Ali Inan
2020
Corpus ID: 214719874
Recommendation engines analyze ratings data to suggest individuals new products or services based on their past experiences…
Expand
2019
2019
Privacy Protection Algorithm for Frequent Itemset Mining
Bo Peng
,
Xian Li
,
Wei Cui
IEEE International Conference on Power Data…
2019
Corpus ID: 212636125
A differentially private frequent itemset mining algorithm DP-FMA is proposed for privacy protection of frequent itemset mining…
Expand
2018
2018
Towards Differential Privacy for Symbolic Systems
Austin M. Jones
,
Kevin J. Leahy
,
M. Hale
American Control Conference
2018
Corpus ID: 52811575
In this paper, we develop a privacy implementation for symbolic control systems. Such systems generate sequences of non-numerical…
Expand
2018
2018
Histogram Publishing Method Based on Differential Privacy
Xin Liu
,
Sheng-li Li
DEStech Transactions on Computer Science and…
2018
Corpus ID: 54933411
Differential privacy does not care about the background knowledge of attackers, and can strongly protect the data information to…
Expand
2017
2017
Frequent Itemset Mining with Differential Privacy Based on Transaction Truncation
Ying Xia
,
Yu Huang
,
Xu Zhang
,
Hae-Young Bae
International Conference on Information…
2017
Corpus ID: 4942631
Frequent itemset mining is the basis of discovering transaction relationships and providing information services such as…
Expand
2017
2017
On the the design of optimal location privacy-preserving mechanisms
Simon Oya
,
C. Troncoso
,
F. Pérez-González
arXiv.org
2017
Corpus ID: 186119207
In the last years we have witnessed the appearance of a variety of strategies to design optimal location privacy-preserving…
Expand
2016
2016
Information Pricing - A User-Data Centric Method to Price Information
D. Rao
,
W. Ng
World Congress on Services
2016
Corpus ID: 29474971
Big data is the biggest asset today, for organization sto amass and leverage to improve on services and profits. Knowing this…
Expand
2014
2014
Discovering top-k patterns with differential privacy-an accurate approach
Xiaojian Zhang
,
Xiaofeng Meng
Frontiers of Computer Science
2014
Corpus ID: 1772206
Frequent pattern mining discovers sets of items that frequently appear together in a transactional database; these can serve…
Expand
2014
2014
SPPM: Sparse Privacy Preserving Mappings
Salman Salamatian
,
N. Fawaz
,
B. Kveton
,
N. Taft
Conference on Uncertainty in Artificial…
2014
Corpus ID: 11363115
We study the problem of a user who has both public and private data, and wants to release the public data, e.g. to a…
Expand
2010
2010
Differential Privacy and the Fat-Shattering Dimension of Linear Queries
Aaron Roth
International Workshop and International Workshop…
2010
Corpus ID: 2249614
In this paper, we consider the task of answering linear queries under the constraint of differential privacy. This is a general…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE