2016
DOI: 10.2200/s00735ed1v01y201609spt018
|View full text |Cite
|
Sign up to set email alerts
|

Differential Privacy: From Theory to Practice

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
84
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 106 publications
(85 citation statements)
references
References 79 publications
0
84
0
1
Order By: Relevance
“…We computeâ −1 fromp and g n (1 ≤ n ≤ N ) by substituting (30), (31), and (32) into (28) (we can computeâ −1 with time complexity O(N K 2 ); for details, see Appendix B). It should be noted, however, thatQ in (32) may not be accurately computed, since the matrix λI K is added toŜ in (32). As a consequence,â −1 may also not be accurately computed.…”
Section: Proposed Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…We computeâ −1 fromp and g n (1 ≤ n ≤ N ) by substituting (30), (31), and (32) into (28) (we can computeâ −1 with time complexity O(N K 2 ); for details, see Appendix B). It should be noted, however, thatQ in (32) may not be accurately computed, since the matrix λI K is added toŜ in (32). As a consequence,â −1 may also not be accurately computed.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…In fact, the bias of the proposed method was larger than that of the EM reconstruction method in our experiments (as shown in Appendix C). We consider this is because we applied the Tikhonov regularization to computeQ in (32). A regularization method is generally used to significantly reduce the variance by introducing a bias in the estimate.…”
Section: Optimization Of the Weight Parametermentioning
confidence: 99%
See 1 more Smart Citation
“…In our scheme, the user rating datasets, D and D ′ are neighboring if D can be obtained from D ′ by adding or removing one element. Note that such a definition is usually adopted in Unbounded DP [17]. In this paper, however, we mainly denote datasets by matrices with setting all unselected (and blank) ratings to zero.…”
Section: Differential Privacymentioning
confidence: 99%
“…Lemma 2 (Convexity [28]). Given k mechanisms M 1 , M 2 , ..., M k that satisfy -differential privacy, and p 1 , p 2 , ..., p k ∈ [0,1] such that k i=1 p i = 1, let M denote the mechanism that applies M i with probability p i .…”
Section: B Related Solution Conceptsmentioning
confidence: 99%