The Complexity of Estimating Rényi Entropy, SODA, 2015. ,
Practical locally private heavy hitters, NIPS, 2017. ,
Local, private, efficient protocols for succinct histograms, STOC, 2015. ,
Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds, FOCS, 2014. ,
, Metric Learning, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01121733
Some properties of incomplete U -statistics, Biometrika, vol.63, issue.3, pp.573-580, 1976. ,
The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997. ,
Securely sampling biased coins with applications to differential privacy, IACR Cryptology ePrint Archive, p.823, 2019. ,
Privacy-preserving stream aggregation with fault tolerance, Financial Cryptography, 2012. ,
A statistical view of clustering performance through the theory of U-processes, Journal of Multivariate Analysis, vol.124, pp.42-56, 2014. ,
Scaling-up Empirical Risk Minimization: Optimization of Incomplete U-statistics, Journal of Machine Learning Research, vol.13, pp.165-202, 2016. ,
Ranking and empirical risk minimization of U -statistics, The Annals of Statistics, vol.36, issue.2, pp.844-874, 2008. ,
Ranking data with ordinal labels: Optimality and pairwise aggregation, Machine Learning, vol.91, pp.67-104, 2013. ,
Marginal release under local differential privacy, SIGMOD, 2018. ,
Multiparty computation from somewhat homomorphic encryption, IACR Cryptology ePrint Archive, p.535, 2011. ,
Decoupling: from Dependence to Independence, 1999. ,
Collecting telemetry data privately, NIPS, 2017. ,
Local privacy and statistical minimax rates, FOCS, 2013. ,
Our data, ourselves: Privacy via distributed noise generation, EUROCRYPT, vol.4004, pp.486-503, 2006. ,
Boosting and Differential Privacy, FOCS, 2010. ,
Rappor: Randomized aggregatable privacy-preserving ordinal response, CCS, 2014. ,
A pragmatic introduction to secure multi-party computation, Foundations and Trends in Privacy and Security, vol.2, issue.2-3, pp.70-246, 2018. ,
ICA based on a Smooth Estimation of the Differential Entropy, NIPS, 2008. ,
Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries, PoPETs, 2016. ,
The Foundations of Cryptography, Basic Applications, vol.2, 2004. ,
How to play any mental game or A completeness theorem for protocols with honest majority, STOC, pp.218-229, 1987. ,
Optimising area under the ROC curve using gradient descent, ICML, 2004. ,
A class of statistics with asymptotically normal distribution, Annals of Mathematics and Statistics, vol.19, pp.293-325, 1948. ,
Optimizing search engines using clickthrough data, KDD, 2002. ,
Extremal mechanisms for local differential privacy, NIPS, 2014. ,
On the Generalization Ability of Online Learning Algorithms for Pairwise Loss Functions, ICML, 2013. ,
Answering range queries under local differential privacy, SIGMOD, 2019. ,
Automatic Evaluation of Information Ordering: Kendall's Tau, Computational Linguistics, vol.32, issue.4, pp.471-484, 2006. ,
U -statistics: Theory and practice, 1990. ,
A proof of security of yao's protocol for two-party computation, J. Cryptology, vol.22, issue.2, pp.161-188, 2009. ,
On a Test of Whether one of Two Random Variables is Stochastically Larger than the Other, Annals of Mathematical Statistics, vol.18, issue.1, pp.50-60, 1947. ,
, Computational Differential Privacy, 2009.
Privacy-preserving deep learning, CCS, 2015. ,
Diabetes data, 2014. ,
, Asymptotic Statistics, 2000.
, Trip advisor data, 2010.
Locally differentially private protocols for frequency estimation, USENIX Security Symposium, 2017. ,