Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Principled Evaluation of Differentially Private Algorithms using DPBench., , , , and . CoRR, (2015)Optimizing Histogram Queries under Differential Privacy, , , , and . CoRR, (2009)EKTELO: A Framework for Defining Differentially-Private Computations., , , , , and . SIGMOD Conference, page 115-130. ACM, (2018)The matrix mechanism: optimizing linear counting queries under differential privacy., , , , and . VLDB J., 24 (6): 757-781 (2015)Avoiding Bias when Aggregating Relational Data with Degree Disparity, , and . Proceedings of the Twentieth International Conference on Machine Learning (ICML), page 274--281. (2003)Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy., , , , , , , , , and 3 other author(s). CoRR, (2022)Differential Privacy in the Wild: A Tutorial on Current Practices & Open Challenges., , and . SIGMOD Conference, page 1727-1730. ACM, (2017)How PhD students at research universities can prepare for a career at a liberal arts college (abstract only)., , and . SIGCSE, page 752. ACM, (2013)Relationship privacy: output perturbation for queries with joins., , , and . PODS, page 107-116. ACM, (2009)IoT-Detective: Analyzing IoT Data Under Differential Privacy., , , , , , and . SIGMOD Conference, page 1725-1728. ACM, (2018)