Seguir
Adam Smith
Adam Smith
Professor of Computer Science, Boston University
Dirección de correo verificada de bu.edu - Página principal
Título
Citado por
Citado por
Año
Calibrating noise to sensitivity in private data analysis
C Dwork, F McSherry, K Nissim, A Smith
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
102072006
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Y Dodis, L Reyzin, A Smith
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4464*2004
What can we learn privately?
SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith
Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008
17432008
Smooth sensitivity and sampling in private data analysis
K Nissim, S Raskhodnikova, A Smith
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
14782007
Private empirical risk minimization: Efficient algorithms and tight error bounds
R Bassily, A Smith, A Thakurta
2014 IEEE 55th annual symposium on foundations of computer science, 464-473, 2014
10902014
Local, private, efficient protocols for succinct histograms
R Bassily, A Smith
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
5632015
Composition attacks and auxiliary information in data privacy
SR Ganta, SP Kasiviswanathan, A Smith
Proceeding of the 14th ACM SIGKDD international conference on Knowledge …, 2008
5272008
Private convex empirical risk minimization and high-dimensional regression
D Kifer, A Smith, A Thakurta
Conference on Learning Theory, 25.1-25.40, 2012
4962012
Analyzing graphs with node differential privacy
SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
4322013
Distributed differential privacy via shuffling
A Cheu, A Smith, J Ullman, D Zeber, M Zhilyaev
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
4302019
Toward privacy in public databases
S Chawla, C Dwork, F McSherry, A Smith, H Wee
Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005
4012005
Authentication of quantum messages
H Barnum, C Crépeau, D Gottesman, A Smith, A Tapp
The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002 …, 2002
3822002
Differential privacy for statistics: What we know and what we want to learn
C Dwork, A Smith
Journal of Privacy and Confidentiality 1 (2), 2010
3572010
Leftover hashing against quantum side information
M Tomamichel, C Schaffner, A Smith, R Renner
IEEE Transactions on Information Theory 57 (8), 5524-5535, 2011
3522011
Privacy-preserving statistical estimation with optimal convergence rates
A Smith
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
3512011
Secure remote authentication using biometric data
X Boyen, Y Dodis, J Katz, R Ostrovsky, A Smith
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
3492005
Exposed! a survey of attacks on private data
C Dwork, A Smith, T Steinke, J Ullman
Annual Review of Statistics and Its Application 4 (1), 61-84, 2017
3382017
Private analysis of graph structure
V Karwa, S Raskhodnikova, A Smith, G Yaroslavtsev
Proceedings of the VLDB Endowment 4 (11), 1146-1157, 2011
3332011
Robust fuzzy extractors and authenticated key agreement from close secrets
Y Dodis, J Katz, L Reyzin, A Smith
Advances in Cryptology-CRYPTO 2006, 232-250, 2006
330*2006
Discovering frequent patterns in sensitive data
R Bhaskar, S Laxman, A Smith, A Thakurta
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
3262010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20