Encrypted statistical machine learning: new privacy preserving methods, 2015. ,
Random Graphs, 2001. ,
Practical Secure Aggregation for Privacy-Preserving Machine Learning, CCS, 2017. ,
Randomized Gossip Algorithms, IEEE/ACM Transactions on Networking, vol.14, issue.SI, pp.2508-2530, 2006. ,
Efficient protocols for set membership and range proofs, Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), pp.234-252, 2008. ,
Random Key Predistribution Schemes for Sensor Networks, S&P, 2003. ,
Extending Gossip Algorithms to Distributed Estimation of U-statistics, NIPS, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01214665
, Privacy Aware Learning. In NIPS, 2012.
Differential Privacy, ICALP, 2006. ,
Differential Privacy: A Survey of Results, 2008. ,
Regularized multi-task learning, SIGKDD, 2004. ,
, On the connectivity of random m-orientable graphs and digraphs. Combinatorica, vol.2, pp.347-359, 1982.
Secure multi-party computation, 1998. ,
ML Confidential: Machine Learning on Encrypted Data, ICISC, 2012. ,
Privacy Preserving Randomized Gossip Algorithms, 2017. ,
Blowfish privacy: tuning privacy-utility trade-offs using policies, SIGMOD, 2014. ,
Differentially private iterative synchronous consensus, ACM workshop on Privacy in the Electronic Society, 2012. ,
Extremal Mechanisms for Local Differential Privacy, Journal of Machine Learning Research, vol.17, pp.1-51, 2016. ,
On the 'Semantics' of Differential Privacy: A Bayesian Formulation, Journal of Privacy and Confidentiality, vol.6, issue.1, pp.1-16, 2014. ,
Gossip-Based Computation of Aggregate Information, FOCS, 2003. ,
An Axiomatic View of Statistical Privacy and Utility, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.5-46, 2012. ,
No free lunch in data privacy, SIGKDD, 2011. ,
Pufferfish: A framework for mathematical privacy definitions, ACM Transactions on Database Systems, vol.39, issue.1, p.36, 2014. ,
Membership privacy: a unifying framework for privacy definitions, CCS, 2013. ,
Secure Multiparty Computation for Privacy-Preserving Data Mining, Journal of Privacy and Confidentiality, vol.1, issue.1, pp.59-98, 2009. ,
Privacy-preserving asymptotic average consensus, 2013. ,
DOI : 10.23919/ecc.2013.6669251
Privacy preserving average consensus, CDC, 2014. ,
DOI : 10.1109/cdc.2014.7039717
Bitcoin: A Peer-to-Peer Electronic Cash System, 2008. ,
Public-key cryptosystems based on composite degree residuosity classes, EUROCRYPT, 1999. ,
Diffusion and Superposition Distances for Signals Supported on Networks, IEEE Transactions on Signal and Information Processing over Networks, vol.1, issue.1, pp.20-32, 2015. ,
The emerging field of signal processing on graphs: Extending high-dimensional data analysis to networks and other irregular domains, IEEE Signal Processing Magazine, vol.30, issue.3, pp.83-98, 2013. ,
Problems in decentralized decision making and computation, 1984. ,
On the Connectivity of Sensor Networks Under Random Pairwise Key Predistribution, IEEE Transactions on Information Theory, vol.59, issue.9, pp.5754-5762, 2013. ,
Protocols for secure computations, FOCS, 1982. ,
Learning with Local and Global Consistency, NIPS, 2003. ,
Learning from labeled and unlabeled data with label propagation, 2002. ,