Author of the publication

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.

, , , , , and . ACM Trans. Priv. Secur., 20 (4): 16:1-16:33 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization., , , , , and . ACM Trans. Priv. Secur., 20 (4): 16:1-16:33 (2017)Understanding the Sparse Vector Technique for Differential Privacy., , and . CoRR, (2016)Understanding the Sparse Vector Technique for Differential Privacy., , and . Proc. VLDB Endow., 10 (6): 637-648 (2017)Differential Privacy: From Theory to Practice, , , and . Synthesis Lectures on Information Security, Privacy, & Trust Morgan & Claypool Publishers, (2016)TAG: An Efficient Storage System Towards Transactional and Analytical Processing on Property Graphs., , and . IWQoS, page 1-4. IEEE, (2023)SelectiveEC: Selective Reconstruction in Erasure-coded Storage Systems., , , , and . HotStorage, USENIX Association, (2020)Publishing Graph Degree Distribution with Node Differential Privacy., , and . SIGMOD Conference, page 123-138. ACM, (2016)Deterministic Data Distribution for Efficient Recovery in Erasure-Coded Storage Systems., , , , and . CoRR, (2020)Enabling Efficient Erasure Coding in Disaggregated Memory Systems., , , , , , and . IEEE Trans. Parallel Distributed Syst., 35 (1): 154-168 (January 2024)A Data Layout and Fast Failure Recovery Scheme for Distributed Storage Systems With Mixed Erasure Codes., , , , and . IEEE Trans. Computers, 71 (8): 1740-1754 (2022)