Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2010
DOI: 10.1145/1835804.1835868
|View full text |Cite
|
Sign up to set email alerts
|

Data mining with differential privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
311
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 384 publications
(314 citation statements)
references
References 19 publications
2
311
0
1
Order By: Relevance
“…As we will see in Section 5, our results can also be adapted to cover the case of unbounded-DP, thus further extending their applicability to other use-cases of differential privacy. Examples of settings where DP mechanisms have been proposed, and yet an adversary with incomplete background knowledge appears reasonable, can be found in location privacy [1] or data mining [7] for instance.…”
Section: Discussionmentioning
confidence: 99%
“…As we will see in Section 5, our results can also be adapted to cover the case of unbounded-DP, thus further extending their applicability to other use-cases of differential privacy. Examples of settings where DP mechanisms have been proposed, and yet an adversary with incomplete background knowledge appears reasonable, can be found in location privacy [1] or data mining [7] for instance.…”
Section: Discussionmentioning
confidence: 99%
“…• Comparing the quality of the patterns discovered in data before and after applying privacy-preserving techniques to the data (Fletcher & Islam 2014, 2015a, Friedman & Schuster 2010; and…”
Section: Problem Statementmentioning
confidence: 99%
“…Two major areas have by now clearly emerged: Quantitative Information Flow (qif) [8,19,5,6,9,10,26] and Differential Privacy (dp) [13,14,21,22,16,17]. As discussed in [4], qif is mainly concerned with quantifying the degree of protection offered against an adversary trying to guess the whole secret; dp is rather concerned with protection of individual bits of the secret, possibly in the presence of background information, like knowledge of the remaining bits.…”
Section: Introductionmentioning
confidence: 99%
“…This is an instance of the composition attacks which are well known in the context of dp, where they are thwarted by allotting each user or group of users a privacy budget that limits the overall number of queries to the mechanism; see e.g. [21,16]. For another example, in a de-anonymization scenario similar to [23], [6] shows that gathering information about a target individual can be modeled as collecting multiple observations from a certain randomization mechanism.…”
Section: Introductionmentioning
confidence: 99%