Author of the publication

Orthogonal mechanism for answering batch queries with differential privacy.

, , , and . SSDBM, page 24:1-24:10. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining., and . SDM, page 375-386. SIAM, (2008)Privacy-Preserving Genetic Algorithms for Rule Discovery., and . DaWaK, volume 4654 of Lecture Notes in Computer Science, page 407-417. Springer, (2007)Privacy-Preserving Self-Organizing Map., and . DaWaK, volume 4654 of Lecture Notes in Computer Science, page 428-437. Springer, (2007)A Study of Efficiency and Accuracy of Secure Multiparty Protocol in Privacy-Preserving Data Mining., , and . AINA Workshops, page 85-90. IEEE Computer Society, (2012)Privacy-Preserving Linear Fisher Discriminant Analysis., and . PAKDD, volume 5012 of Lecture Notes in Computer Science, page 136-147. Springer, (2008)Privacy-Preserving Singular Value Decomposition., , and . ICDE, page 1267-1270. IEEE Computer Society, (2009)Privacy-preservation for gradient descent methods., , , and . KDD, page 775-783. ACM, (2007)Classifying Graphs Using Theoretical Metrics: A Study of Feasibility., , and . DASFAA Workshops, volume 6637 of Lecture Notes in Computer Science, page 53-64. Springer, (2011)Privacy Preserving Support Vector Machine Using Non-linear Kernels on Hadoop Mahout., , and . CSE, page 941-948. IEEE Computer Society, (2013)Encrypted Set Intersection Protocol for Outsourced Datasets., , , , and . IC2E, page 135-140. IEEE Computer Society, (2014)