Media Summary: Evaluating Differentially Private Machine Learning in Practice Bargav Jayaraman, University of Virginia Abhradeep Guha Thakurta, Assistant Professor, University of California, Santa Cruz Machine learning has fundamentally ... Tianhao Wang, Jeremiah Blocki, and Ninghui Li, Purdue University; Somesh Jha, University of Wisconsin Madison Protocols ...

Usenix Security 19 Utility Optimized Local Differential Privacy Mechanisms For - Detailed Analysis & Overview

Evaluating Differentially Private Machine Learning in Practice Bargav Jayaraman, University of Virginia Abhradeep Guha Thakurta, Assistant Professor, University of California, Santa Cruz Machine learning has fundamentally ... Tianhao Wang, Jeremiah Blocki, and Ninghui Li, Purdue University; Somesh Jha, University of Wisconsin Madison Protocols ... Brendan Avent and Aleksandra Korolova, University of Southern California; David Zeber and Torgeir Hovden, Mozilla; Benjamin ... Answering Multi-Dimensional Analytical Queries under

Photo Gallery

USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for
USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols
USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection
USENIX Security '22 - Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data
USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice
USENIX Security '17 - Differential Privacy: From Theory to Deployment
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...
USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation
USENIX Security '17 - BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...
USENIX Security '24 - Relation Mining Under Local Differential Privacy
Sponsored
Sponsored
View Detailed Profile
USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for

USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for

Utility

USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols

USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols

USENIX Security

Sponsored
USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection

USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection

USENIX Security

USENIX Security '22 - Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data

USENIX Security '22 - Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data

USENIX Security

USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice

USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice

Evaluating Differentially Private Machine Learning in Practice Bargav Jayaraman, University of Virginia

Sponsored
USENIX Security '17 - Differential Privacy: From Theory to Deployment

USENIX Security '17 - Differential Privacy: From Theory to Deployment

Abhradeep Guha Thakurta, Assistant Professor, University of California, Santa Cruz Machine learning has fundamentally ...

USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning

USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning

USENIX Security

USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...

USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...

USENIX Security

USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation

USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation

Tianhao Wang, Jeremiah Blocki, and Ninghui Li, Purdue University; Somesh Jha, University of Wisconsin Madison Protocols ...

USENIX Security '17 - BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

USENIX Security '17 - BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model

Brendan Avent and Aleksandra Korolova, University of Southern California; David Zeber and Torgeir Hovden, Mozilla; Benjamin ...

USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...

USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...

USENIX Security

USENIX Security '24 - Relation Mining Under Local Differential Privacy

USENIX Security '24 - Relation Mining Under Local Differential Privacy

Relation Mining Under

USENIX Security '22 - Communication-Efficient Triangle Counting under Local Differential Privacy

USENIX Security '22 - Communication-Efficient Triangle Counting under Local Differential Privacy

USENIX Security

USENIX Security '21 - Locally Differentially Private Analysis of Graph Statistics

USENIX Security '21 - Locally Differentially Private Analysis of Graph Statistics

USENIX Security

USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference

USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference

USENIX Security

USENIX Security '23 - PrivateFL: Accurate, Differentially Private Federated Learning via...

USENIX Security '23 - PrivateFL: Accurate, Differentially Private Federated Learning via...

USENIX Security

USENIX Security '24 - Efficient Privacy Auditing in Federated Learning

USENIX Security '24 - Efficient Privacy Auditing in Federated Learning

Efficient

Answering Multi-Dimensional Analytical Queries under Local Differential Privacy

Answering Multi-Dimensional Analytical Queries under Local Differential Privacy

Answering Multi-Dimensional Analytical Queries under

USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User

USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User

Understanding and Improving