The Complexity of Estimating Rényi Entropy, SODA, 2015. ,

Practical locally private heavy hitters, NIPS, 2017. ,

Local, private, efficient protocols for succinct histograms, STOC, 2015. ,

Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds, FOCS, 2014. ,

, Metric Learning, 2015.

URL : https://hal.archives-ouvertes.fr/hal-01121733

Some properties of incomplete U -statistics, Biometrika, vol.63, issue.3, pp.573-580, 1976. ,

The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997. ,

Securely sampling biased coins with applications to differential privacy, IACR Cryptology ePrint Archive, p.823, 2019. ,

Privacy-preserving stream aggregation with fault tolerance, Financial Cryptography, 2012. ,

A statistical view of clustering performance through the theory of U-processes, Journal of Multivariate Analysis, vol.124, pp.42-56, 2014. ,

Scaling-up Empirical Risk Minimization: Optimization of Incomplete U-statistics, Journal of Machine Learning Research, vol.13, pp.165-202, 2016. ,

Ranking and empirical risk minimization of U -statistics, The Annals of Statistics, vol.36, issue.2, pp.844-874, 2008. ,

Ranking data with ordinal labels: Optimality and pairwise aggregation, Machine Learning, vol.91, pp.67-104, 2013. ,

Marginal release under local differential privacy, SIGMOD, 2018. ,

Multiparty computation from somewhat homomorphic encryption, IACR Cryptology ePrint Archive, p.535, 2011. ,

Decoupling: from Dependence to Independence, 1999. ,

Collecting telemetry data privately, NIPS, 2017. ,

Local privacy and statistical minimax rates, FOCS, 2013. ,

Our data, ourselves: Privacy via distributed noise generation, EUROCRYPT, vol.4004, pp.486-503, 2006. ,

Boosting and Differential Privacy, FOCS, 2010. ,

Rappor: Randomized aggregatable privacy-preserving ordinal response, CCS, 2014. ,

A pragmatic introduction to secure multi-party computation, Foundations and Trends in Privacy and Security, vol.2, issue.2-3, pp.70-246, 2018. ,

ICA based on a Smooth Estimation of the Differential Entropy, NIPS, 2008. ,

Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries, PoPETs, 2016. ,

The Foundations of Cryptography, Basic Applications, vol.2, 2004. ,

How to play any mental game or A completeness theorem for protocols with honest majority, STOC, pp.218-229, 1987. ,

Optimising area under the ROC curve using gradient descent, ICML, 2004. ,

A class of statistics with asymptotically normal distribution, Annals of Mathematics and Statistics, vol.19, pp.293-325, 1948. ,

Optimizing search engines using clickthrough data, KDD, 2002. ,

Extremal mechanisms for local differential privacy, NIPS, 2014. ,

On the Generalization Ability of Online Learning Algorithms for Pairwise Loss Functions, ICML, 2013. ,

Answering range queries under local differential privacy, SIGMOD, 2019. ,

Automatic Evaluation of Information Ordering: Kendall's Tau, Computational Linguistics, vol.32, issue.4, pp.471-484, 2006. ,

U -statistics: Theory and practice, 1990. ,

A proof of security of yao's protocol for two-party computation, J. Cryptology, vol.22, issue.2, pp.161-188, 2009. ,

On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other, Annals of Mathematical Statistics, vol.18, issue.1, pp.50-60, 1947. ,

, Computational Differential Privacy, 2009.

Privacy-preserving deep learning, CCS, 2015. ,

Diabetes data, 2014. ,

, Asymptotic Statistics, 2000.

, Trip advisor data, 2010.

Locally differentially private protocols for frequency estimation, USENIX Security Symposium, 2017. ,