We study the complexity of the problem of verifying differential privacy...
Motivated by privacy concerns in long-term longitudinal studies in medic...
Although Secure Multiparty Computation (SMC) has seen considerable
devel...
The notion of replicable algorithms was introduced in Impagliazzo et al....
"Program sensitivity" measures the distance between the outputs of a pro...
Formal reasoning about hashing-based probabilistic data structures often...
We show a generic reduction from multiclass differentially private PAC
l...
Adversarial computations are a widely studied class of computations wher...
We present two sample-efficient differentially private mean estimators f...
In this paper, we study the Empirical Risk Minimization (ERM) problem in...
Differential privacy is a de facto standard in data privacy with applica...
Social science and economics research is often based on data collected i...
Deductive verification techniques, based on program logics (i.e., the fa...
We study the problem of verifying differential privacy for loop-free pro...
We study the problem of verifying differential privacy for straight line...
In this paper we study the uncapacitated facility location problem in th...
In this paper, we study the problem of estimating smooth Generalized Lin...
Differential privacy offers a formal framework for reasoning about priva...
A fundamental result in differential privacy states that the privacy
gua...
Differential privacy is the gold standard in data privacy, with applicat...
Relational type systems have been designed for several applications incl...
Relational cost analysis aims at formally establishing bounds on the
dif...
This work provides tight upper- and lower-bounds for the problem of mean...
Probabilistic programming provides a convenient lingua franca for writin...
The Fuzz programming language [Reed and Pierce, 2010] uses an elegant li...
The Fuzz programming language [Reed and Pierce, 2010] uses an elegant li...
Differential privacy comes equipped with multiple analytical tools for t...
Research on deductive verification of probabilistic programs has conside...
We extend the simply-typed guarded λ-calculus with discrete
probabilitie...
In this paper, we study the Empirical Risk Minimization problem in the
n...
Symbolic execution is a classical program analysis technique, widely use...
We develop a semantics framework for verifying recent relaxations of
dif...