Author of the publication

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.

, , , , , and . CCS, page 425-438. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PrivLava: Synthesizing Relational Data with Foreign Keys under Differential Privacy., , and . Proc. ACM Manag. Data, 1 (2): 142:1-142:25 (2023)Efficient Pure Exploration in Adaptive Round model., , , and . NeurIPS, page 6605-6614. (2019)Almost Optimal Anytime Algorithm for Batched Multi-Armed Bandits., , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5065-5073. PMLR, (2021)Optimal Streaming Algorithms for Multi-Armed Bandits., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5045-5054. PMLR, (2021)Multi-Task Processing in Vertex-Centric Graph Systems: Evaluations and Insights., , , , , and . EDBT, page 247-259. OpenProceedings.org, (2023)A Scalable Approach to Inferring Travel Time in Singapore's Metro Network using Smart Card Data., , and . ISC2, page 1-8. IEEE, (2018)Shortest Path and Distance Queries on Road Networks: An Experimental Evaluation., , , , , and . Proc. VLDB Endow., 5 (5): 406-417 (2012)Feature Inference Attack on Model Predictions in Vertical Federated Learning., , , and . CoRR, (2020)Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy., , , and . IEEE Trans. Knowl. Data Eng., 30 (9): 1770-1782 (2018)The Disruptions of 5G on Data-Driven Technologies and Applications., , , , , , , , , and 5 other author(s). IEEE Trans. Knowl. Data Eng., 32 (6): 1179-1198 (2020)