PPT-Differentially Private Data Analysis of Social Networks via Restricted Sensitivity

Author : conchita-marotz | Published Date : 2018-09-21

Jeremiah Blocki Avrim Blum Anupam Datta Or Sheffet Theory Lunch Fall 2012 Goal useful statistics Preserve Privacy and Release Useful Statistics 2 Outline Background

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Differentially Private Data Analysis of ..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Differentially Private Data Analysis of Social Networks via Restricted Sensitivity: Transcript


Jeremiah Blocki Avrim Blum Anupam Datta Or Sheffet Theory Lunch Fall 2012 Goal useful statistics Preserve Privacy and Release Useful Statistics 2 Outline Background Social Networks Differential Privacy. Presentation . #3. 12/11/2014. This presentation. defines confidential and restricted information. . and gives examples of data that should be destroyed. . . 1. Stay Tuned!. This is the THIRD in a series of presentations to help departments prepare for campus clean-up day.. Jun Zhang. , Graham . Cormode. , Cecilia M. . Procopiuc. , . Divesh. . Srivastava. , Xiaokui Xiao. The Problem: Private Data Release. Differential Privacy. Challenges. The Algorithm: PrivBayes. Bayesian Network. Jake Blanchard. Fall . 2010. Introduction. Sensitivity Analysis = the study of how uncertainty in the output of a model can be apportioned to different input parameters. Local sensitivity = focus on sensitivity at a particular set of input parameters, usually using gradients or partial derivatives. Thorsten Wagener. thorsten.wagener@bristol.ac.uk. With Francesca . Pianosi. Francesca.pianosi. @bristol.ac.uk. My background. Civil engineering with focus on hydrology. University of Siegen, TU Delft, Imperial College London. Latest threats….. Rolando Panez | Security Engineer. RansomWare. http://blog.checkpoint.com/wp-content/uploads/2016/04/4-pic.png. Lawrence Abrams – Bleeping Computer . Agenda. [Restricted] ONLY for designated groups and individuals. Yin “David” Yang .  . Zhenjie. Zhang. .  . Gerome . Miklau. . Prev. . Session: Marianne . Winslett. .  . Xiaokui Xiao. 1. What we talked in the last session. Privacy is a major concern in data publishing. Thorsten Wagener. thorsten.wagener@bristol.ac.uk. With Francesca . Pianosi. Francesca.pianosi. @bristol.ac.uk. My background. Civil engineering with focus on hydrology. University of Siegen, TU Delft, Imperial College London. Node Differential . Privacy . Sofya. . Raskhodnikova. Penn State University. Joint work with. . . Shiva . Kasiviswanathan. . (. GE Research. ),. . Kobbi. . Nissim. . (. Ben-Gurion U. and Harvard U.. General Tools for Post-Selection Inference. Aaron Roth. What do we want to protect against?. Over-fitting from fixed algorithmic procedures (easiest – might hope to analyze exactly). e.g. variable/parameter selection followed by model fitting. James S. Strand. The University of Texas at Austin. Funding and Computational Resources Provided by the Department of Energy through the PSAAP Program. Predictive Engineering and Computational Sciences. INSTRUCTIONS AND INFORMATIONSouth Carolina Regulation 123-152 designates Restricted Nonnative Wildlife that have the potential to become established in this State in sufficient numbers so as to become FinTech for Financial InclusionHarnessing and Balancing Innovation Payments Aspects of Financial Inclusion in the Fintech EraMaria Teresa Chimienti The World BankThomas Lammer CPMI SecretariatViews e Hao Peng. 1*. , . Haoran. Li. 2*. , . Yangqiu Song. 2. , Vincent Zheng. 3. , . Jianxin. Li. 1. 1. Beihang University. 2. Hong Kong University of Science and Technology. 3. AI Group, . Webank. Co., Ltd. Jiancheng Wu. 1, 2. , . Shaopeng Wang. 1, 2. , . Youhua Wang. 1, 2. , . Chengcheng Liu. 1, 2. *. 1. State Key Laboratory of Reliability and Intelligence of Electrical Equipment. ,. Hebei University of Technology.

Download Document

Here is the link to download the presentation.
"Differentially Private Data Analysis of Social Networks via Restricted Sensitivity"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents