Adam D. Smith
Affiliations: Boston University, Department of Computer Science, Boston, MA, USA
 Pennsylvania State University, Computer Science and Engineering Department, University Park, PA, USA (20072017)
 Weizmann Institute of Science, Department of Computer Science and Applied Mathematics, Rehovot, Israel (former)
 McGill University, Montréal, School of Computer Science, CA (former)
 MIT, Computer Science and AI Lab, Cambridge, MA, USA (19992004)
According to our database^{1},
Adam D. Smith
authored at least 116 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:

on orcid.org

on id.loc.gov
On csauthors.net:
Bibliography
2023
Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation.
CoRR, 2023
Fast, SampleEfficient, AffineInvariant Private Mean and Covariance Estimation for Subgaussian Distributions.
CoRR, 2023
Proceedings of the 42nd ACM SIGMODSIGACTSIGAI Symposium on Principles of Database Systems, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 50th International Colloquium on Automata, Languages, and Programming, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
CoRR, 2022
CoRR, 2022
Improved Differential Privacy for SGD via Optimal Private Linear Operators on Adaptive Streams.
NeurIPS, 2022
Proceedings of the Conference on Learning Theory, 25 July 2022, London, UK., 2022
2021
SIAM J. Comput., 2021
J. Priv. Confidentiality, 2021
J. Cryptol., 2021
CoRR, 2021
When is memorization of irrelevant training data necessary for highaccuracy learning?
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
IEEE Trans. Inf. Theory, 2020
Empirical Risk Minimization in the Noninteractive Local Model of Differential Privacy.
J. Mach. Learn. Res., 2020
The FlajoletMartin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019
Noninteractive Locally Private Learning of Linear Models via Polynomial Approximations.
Proceedings of the Algorithmic Learning Theory, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Differentially Private Empirical Risk Minimization in Noninteractive Local Model via Polynomial of Inner Product Approximation.
CoRR, 2018
CoRR, 2018
CoRR, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Revealing Network Structure, Confidentially: Improved Rates for NodePrivate Graphon Estimation.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
2017
J. Cryptol., 2017
CoRR, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
Encyclopedia of Algorithms, 2016
J. Priv. Confidentiality, 2016
J. ACM, 2016
CoRR, 2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Lipschitz Extensions for NodePrivate Graph Statistics and the Generalized Exponential Mechanism.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Noninterative ZeroKnowledge Proofs.
J. Cryptol., 2015
On the Regularity of Lossy RSA: Improved Bounds and Applications to PaddingBased Encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Efficient Lipschitz Extensions for HighDimensional Graph Statistics and Node Private Degree Distributions.
CoRR, 2015
Proceedings of the FortySeventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
2014
J. Priv. Confidentiality, 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Proceedings of the TwentyFifth Annual ACMSIAM Symposium on Discrete Algorithms, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Algorithmica, 2013
Proceedings of the Theory of Cryptography  10th Theory of Cryptography Conference, 2013
Proceedings of the TwentyFourth Annual ACMSIAM Symposium on Discrete Algorithms, 2013
(Nearly) Optimal Algorithms for Private Online Learning in Fullinformation and Bandit Settings.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 58, 2013
CoupledWorlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology, 2013
Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso.
Proceedings of the COLT 2013, 2013
2012
IEEE Trans. Inf. Theory, 2012
J. Priv. Confidentiality, 2012
Private Convex Optimization for Empirical Risk Minimization with Applications to Highdimensional Regression.
Proceedings of the COLT 2012, 2012
2011
IEEE Trans. Inf. Theory, 2011
SIAM J. Comput., 2011
Proc. VLDB Endow., 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
2010
J. Priv. Confidentiality, 2010
J. Cryptol., 2010
Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate.
Electron. Colloquium Comput. Complex., 2010
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010
2009
Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem.
SIAM J. Comput., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
IEEE Trans. Inf. Theory, 2008
CoRR, 2008
CoRR, 2008
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the TwentyFourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
2006
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Electron. Colloquium Comput. Complex., 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006
Proceedings of the Advances in Cryptology, 2006
2005
Sublinear Algorithms for Approximating String Compressibility and the Distribution Support Size
Electron. Colloquium Comput. Complex., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
PhD thesis, 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
ListDecoding of Linear Functions and Analysis of a TwoRound ZeroKnowledge Argument.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
Proceedings of the Advances in Cryptology, 2004
Small Pseudorandom Families of Matrices: Derandomizing Approximate Quantum Encryption.
Proceedings of the Approximation, 2004
2003
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Fourteenth Annual ACMSIAM Symposium on Discrete Algorithms, 2003
Proceedings of the Advances in Cryptology, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the TwentyFirst Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
1999
CoRR, 1999