Ashwin Machanavajjhala

According to our database1, Ashwin Machanavajjhala authored at least 106 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
PrivateSQL: A Differentially Private SQL Query Engine.
PVLDB, 2019

PSynDB: Accurate and Accessible Private Data Generation.
PVLDB, 2019

Olympus: Sensor Privacy through Utility Aware Obfuscation.
PoPETs, 2019

Answering Summation Queries for Numerical Attributes under Differential Privacy.
CoRR, 2019

Capacity Bounded Differential Privacy.
CoRR, 2019

Fair Decision Making using Privacy-Protected Data.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

APEx: Accuracy-Aware Differentially Private Data Exploration.
Proceedings of the 2019 International Conference on Management of Data, 2019

Permissions Plugins as Android Apps.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

PrivStream: Differentially Private Event Detection on Data Streams.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Architecting a Differentially Private SQL Engine.
Proceedings of the CIDR 2019, 2019

2018
Analyzing Your Location Data with Provable Privacy Guarantees.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Randomization Methods to Ensure Data Privacy.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Optimizing error of high-dimensional statistical queries under differential privacy.
PVLDB, 2018

Differentially Private Hierarchical Count-of-Counts Histograms.
PVLDB, 2018

ShrinkWrap: Efficient SQL Query Processing in Differentially Private Data Federations.
PVLDB, 2018

Is my model any good: differentially private regression diagnostics.
Knowl. Inf. Syst., 2018

Shrinkwrap: Differentially-Private Query Processing in Private Data Federations.
CoRR, 2018

Ektelo: A Framework for Defining Differentially-Private Computations.
CoRR, 2018

Optimizing error of high-dimensional statistical queries under differential privacy.
CoRR, 2018

Differentially Private Hierarchical Group Size Estimation.
CoRR, 2018

EKTELO: A Framework for Defining Differentially-Private Computations.
Proceedings of the 2018 International Conference on Management of Data, 2018

IoT-Detective: Analyzing IoT Data Under Differential Privacy.
Proceedings of the 2018 International Conference on Management of Data, 2018

2017
Private Exploration Primitives for Data Cleaning.
CoRR, 2017

One-sided Differential Privacy.
CoRR, 2017

Scaling Private Record Linkage using Output Constrained Differential Privacy.
CoRR, 2017

Privacy-Preserving Data Analysis for the Federal Statistical Agencies.
CoRR, 2017

Directed Edge Recommender System.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

Differential Privacy in the Wild: A Tutorial on Current Practices & Open Challenges.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Pythia: Data Dependent Differentially Private Algorithm Selection.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

DIAS: Differentially Private Interactive Algorithm Selection using Pythia.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Utility Cost of Formal Privacy for Releasing National Employer-Employee Statistics.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

ePrivateeye: to the edge and beyond!
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Protecting Visual Secrets Using Adversarial Nets.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

PeGaSus: Data-Adaptive Differentially Private Stream Processing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Differential Privacy in the Wild: A tutorial on current practices & open challenges.
PVLDB, 2016

A Demonstration of VisDPT: Visual Exploration of Differentially Private Trajectories.
PVLDB, 2016

Exploring Privacy-Accuracy Tradeoffs using DPComp.
Proceedings of the 2016 International Conference on Management of Data, 2016

Principled Evaluation of Differentially Private Algorithms using DPBench.
Proceedings of the 2016 International Conference on Management of Data, 2016

Demo: What You Mark is What Apps See.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

What You Mark is What Apps See.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Ayumu: Efficient lifelogging with focused tasks.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Differentially Private Regression Diagnostics.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

2015
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems.
PVLDB, 2015

Design of Policy-Aware Differentially Private Algorithms.
PVLDB, 2015

Principled Evaluation of Differentially Private Algorithms using DPBench.
CoRR, 2015

On the Privacy Properties of Variants on the Sparse Vector Technique.
CoRR, 2015

Designing statistical privacy for your data.
Commun. ACM, 2015

2014
Pufferfish: A framework for mathematical privacy definitions.
ACM Trans. Database Syst., 2014

Privacy preserving interactive record linkage (PPIRL).
JAMIA, 2014

Differentially Private Algorithms for Empirical Machine Learning.
CoRR, 2014

Answering Query Workloads with Optimal Error under Blowfish Privacy.
CoRR, 2014

Social Genome: Putting Big Data to Work for Population Informatics.
IEEE Computer, 2014

Blowfish privacy: tuning privacy-utility trade-offs using policies.
Proceedings of the International Conference on Management of Data, 2014

MarkIt: privacy markers for protecting visual secrets.
Proceedings of the 2014 ACM Conference on Ubiquitous Computing, 2014

2013
A SPARSI: Partitioning Sensitive Data amongst Multiple Adversaries.
PVLDB, 2013

On Sharing Private Data with Multiple Non-Colluding Adversaries
CoRR, 2013

Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies.
CoRR, 2013

Network sampling.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Entity resolution for big data.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Finding connected components in map-reduce in logarithmic rounds.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

curso: protect yourself from curse of attribute inference: a social network privacy-analyzer.
Proceedings of the 3rd ACM SIGMOD Workshop on Databases and Social Networks, 2013

Scalable Social Coordination with Group Constraints using Enmeshed Queries.
Proceedings of the CIDR 2013, 2013

2012
Publishing Search Logs - A Comparative Study of Privacy Guarantees.
IEEE Trans. Knowl. Data Eng., 2012

Entity Resolution: Theory, Practice & Open Challenges.
PVLDB, 2012

An Analysis of Structured Data on the Web.
PVLDB, 2012

Big privacy: protecting confidentiality in big data.
ACM Crossroads, 2012

Scalable Social Coordination using Enmeshed Queries
CoRR, 2012

An Analysis of Structured Data on the Web
CoRR, 2012

Finding Connected Components on Map-reduce in Logarithmic Rounds
CoRR, 2012

Information integration over time in unreliable and uncertain environments.
Proceedings of the 21st World Wide Web Conference 2012, 2012

A rigorous and customizable framework for privacy.
Proceedings of the 31st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2012

An automatic blocking mechanism for large-scale de-duplication tasks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Challenges in enabling social application at scale: cloudDB'12 invited-keynote talk abstract.
Proceedings of the Fourth International Workshop on Cloud Data Management, 2012

2011
E-Privacy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Load Balancing and Range Queries in P2P Systems Using P-Ring.
ACM Trans. Internet Techn., 2011

Personalized Social Recommendations - Accurate or Private?
PVLDB, 2011

CBLOCK: An Automatic Blocking Mechanism for Large-Scale De-duplication Tasks
CoRR, 2011

Personalized Social Recommendations - Accurate or Private?
CoRR, 2011

Highly efficient algorithms for structural clustering of large websites.
Proceedings of the 20th International Conference on World Wide Web, 2011

Collective extraction from heterogeneous web lists.
Proceedings of the Forth International Conference on Web Search and Web Data Mining, 2011

No free lunch in data privacy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Sampling hidden objects using nearest-neighbor oracles.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Feed following: the big data challenge in social applications.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

2010
On the (Im)possibility of Preserving Utility and Privacy in Personalized Social Recommendations.
CoRR, 2010

Privacy in data publishing.
Proceedings of the 26th International Conference on Data Engineering, 2010

2009
Data Publishing against Realistic Adversaries.
PVLDB, 2009

Privacy-Preserving Data Publishing.
Foundations and Trends in Databases, 2009

Privacy in Search Logs
CoRR, 2009

2008
Scalable ranked publish/subscribe.
PVLDB, 2008

Privacy: Theory meets Practice on the Map.
Proceedings of the 24th International Conference on Data Engineering, 2008

2007
L-diversity: Privacy beyond k-anonymity.
TKDD, 2007

Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
CoRR, 2007

P-ring: an efficient and robust P2P range index structure.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Worst-Case Background Knowledge for Privacy-Preserving Data Publishing.
Proceedings of the 23rd International Conference on Data Engineering, 2007

2006
On the efficiency of checking perfect privacy.
Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2006

Trusted CVS.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

l-Diversity: Privacy Beyond k-Anonymity.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2004
A storage and indexing framework for p2p systems.
Proceedings of the 13th international conference on World Wide Web, 2004

An Indexing Framework for Peer-to-Peer Systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004

2002
On perfectly secure cmmunication over arbitrary networks.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

Theory of Equal-Flows in Networks.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

Asynchronous Secure Communication Tolerating Mixed Adversaries.
Proceedings of the Advances in Cryptology, 2002

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A security assurance framework for component based software development.
Informatica (Slovenia), 2001


  Loading...