Author of the publication

Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.

, , , , , and . ACM Trans. Priv. Secur., 20 (4): 16:1-16:33 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical tracing traitors., and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 72540O. SPIE, (2009)Automatic Categorization of Tags in Collaborative Environments., , and . CollaborateCom, volume 10 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 649-662. Springer / ICST, (2008)Proactive Software Tampering Detection., and . ISC, volume 2851 of Lecture Notes in Computer Science, page 352-365. Springer, (2003)Defending against user identity linkage attack across multiple online social networks., , and . WWW (Companion Volume), page 375-376. ACM, (2014)Data leakage mitigation for discretionary access control in collaboration clouds., and . SACMAT, page 103-112. ACM, (2011)Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack., and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 563-577. Springer, (2007)Broadcast Encryption for Differently Privileged., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 283-293. Springer, (2009)Towards Better Software Tamper Resistance., , and . ISC, volume 3650 of Lecture Notes in Computer Science, page 417-430. Springer, (2005)Combinatorial Properties for Traceability Codes Using Error Correcting Codes, and . Information Theory, IEEE Transactions on, 53 (2): 804-808 (February 2007)Private Incremental Regression., , and . PODS, page 167-182. ACM, (2017)