Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ϵKTELO: A Framework for Defining Differentially Private Computations., , , , , , and . ACM Trans. Database Syst., 45 (1): 2:1-2:44 (2020)Pufferfish: A framework for mathematical privacy definitions., and . ACM Trans. Database Syst., 39 (1): 3:1-3:36 (2014)Privately Answering Queries on Skewed Data via Per Record Differential Privacy., , , and . CoRR, (2023)Collective extraction from heterogeneous web lists., , , and . WSDM, page 445-454. ACM, (2011)Architecting a Differentially Private SQL Engine., , , , and . CIDR, www.cidrdb.org, (2019)Synthesizing Linked Data Under Cardinality and Integrity Constraints., , and . SIGMOD Conference, page 619-631. ACM, (2021)Computing Local Sensitivities of Counting Queries with Joins., , , and . SIGMOD Conference, page 479-494. ACM, (2020)MarkIt: privacy markers for protecting visual secrets., , , , and . UbiComp Adjunct, page 1289-1295. ACM, (2014)PrivStream: Differentially Private Event Detection on Data Streams., and . CODASPY, page 145-147. ACM, (2019)CBLOCK: An Automatic Blocking Mechanism for Large-Scale De-duplication Tasks, , , and . (2011)cite arxiv:1111.3689.