Author of the publication

Deep Learning with Differential Privacy.

, , , , , , and . ACM Conference on Computer and Communications Security, page 308-318. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Type System for Java Bytecode Subroutines., and . ACM Trans. Program. Lang. Syst., 21 (1): 90-137 (1999)An Axiomatization of Lamport's Temporal Logic of Actions.. CONCUR, volume 458 of Lecture Notes in Computer Science, page 57-69. Springer, (1990)A Logic of Object-Oriented Programs., and . Verification: Theory and Practice, volume 2772 of Lecture Notes in Computer Science, page 11-41. Springer, (2003)A Modal Deconstruction of Access Control Logics., and . FoSSaCS, volume 4962 of Lecture Notes in Computer Science, page 216-230. Springer, (2008)Nonclausal Temporal Deduction., and . Logic of Programs, volume 193 of Lecture Notes in Computer Science, page 1-15. Springer, (1985)A Simple Differentiable Programming Language., and . CoRR, (2019)Temporal Logic Programming., and . SLP, page 4-16. IEEE-CS, (1987)On SDSI's Linked Local Name Spaces.. J. Comput. Secur., 6 (1-2): 3-22 (1998)Computer-assisted verification of a protocol for certified email., and . Sci. Comput. Program., 58 (1-2): 3-27 (2005)On Hiding Information from an Oracle., , and . J. Comput. Syst. Sci., 39 (1): 21-50 (1989)