Cynthia Dwork

Affiliations:
  • Microsoft Research


According to our database1, Cynthia Dwork authored at least 153 papers between 1982 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

ACM Fellow

ACM Fellow 2015, "For contributions to the science of database privacy, cryptography, and distributed computing.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Equilibria, Efficiency, and Inequality in Network Formation for Hiring and Opportunity.
CoRR, 2024

2023
Complexity-Theoretic Implications of Multicalibration.
CoRR, 2023

Content Moderation and the Formation of Online Communities: A Theoretical Framework.
CoRR, 2023

HappyMap: A Generalized Multi-calibration Method.
CoRR, 2023

New Insights into Multi-Calibration.
CoRR, 2023

HappyMap : A Generalized Multicalibration Method.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

From the Real Towards the Ideal: Risk Prediction in a Better World.
Proceedings of the 4th Symposium on Foundations of Responsible Computing, 2023

From Pseudorandomness to Multi-Group Fairness and Back.
Proceedings of the Thirty Sixth Annual Conference on Learning Theory, 2023

2022
Confidence-Ranked Reconstruction of Census Microdata from Published Statistics.
CoRR, 2022

Improved Generalization Guarantees in Restricted Data Models.
Proceedings of the 3rd Symposium on Foundations of Responsible Computing, 2022

Beyond Bernoulli: Generating Random Outcomes that cannot be Distinguished from Nature.
Proceedings of the International Conference on Algorithmic Learning Theory, 29 March, 2022

2021
Differentially private false discovery rate control.
J. Priv. Confidentiality, 2021

Scaffolding Sets.
CoRR, 2021

Differential Privacy in Distributed Environments: An Overview and Open Questions.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

Private Post-GAN Boosting.
Proceedings of the 9th International Conference on Learning Representations, 2021

Pseudo-Randomness and the Crystal Ball.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
On Privacy in the Age of COVID-19.
J. Priv. Confidentiality, 2020

Outcome Indistinguishability.
Electron. Colloquium Comput. Complex., 2020

Representation via Representations: Domain Generalization via Adversarially Learned Invariant Representations.
CoRR, 2020

Interpreting Robust Optimization via Adversarial Influence Functions.
Proceedings of the 37th International Conference on Machine Learning, 2020

Abstracting Fairness: Oracles, Metrics, and Interpretability.
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020

Individual Fairness in Pipelines.
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020

2019
Differential Privacy in Practice: Expose your Epsilons!
J. Priv. Confidentiality, 2019

Architecture Selection via the Trade-off Between Accuracy and Robustness.
CoRR, 2019

Differential Privacy and the US Census.
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2019

Fairness Under Composition.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Learning from Outcomes: Evidence-Based Rankings.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

2018
The Fienberg Problem: How to Allow Human Interactive Data Analysis in the Age of Differential Privacy.
J. Priv. Confidentiality, 2018

Reminiscences.
J. Priv. Confidentiality, 2018

The Future of the Journal of Privacy and Confidentiality.
J. Priv. Confidentiality, 2018

Composable and versatile privacy via truncated CDP.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Decoupled Classifiers for Group-Fair and Efficient Machine Learning.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

Privacy-preserving Prediction.
Proceedings of the Conference On Learning Theory, 2018

2017
Privacy in Information-Rich Intelligent Infrastructure.
CoRR, 2017

Decoupled classifiers for fair and efficient machine learning.
CoRR, 2017

Privacy-Preserving Data Analysis for the Federal Statistical Agencies.
CoRR, 2017

Guilt-free data reuse.
Commun. ACM, 2017

What's Fair?
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

2016
Calibrating Noise to Sensitivity in Private Data Analysis.
J. Priv. Confidentiality, 2016

Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems.
Electron. Colloquium Comput. Complex., 2016

Concentrated Differential Privacy.
CoRR, 2016

2015
Efficient Algorithms for Privately Releasing Marginals via Convex Relaxations.
Discret. Comput. Geom., 2015

Private False Discovery Rate Control.
CoRR, 2015

Preserving Statistical Validity in Adaptive Data Analysis.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Generalization in Adaptive Data Analysis and Holdout Reuse.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Robust Traceability from Trace Amounts.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

Pure Differential Privacy for Rectangle Queries via Private Partitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
The Algorithmic Foundations of Differential Privacy.
Found. Trends Theor. Comput. Sci., 2014

Analyze gauss: optimal bounds for privacy-preserving principal component analysis.
Proceedings of the Symposium on Theory of Computing, 2014

Using Convex Relaxations for Efficiently and Privately Releasing Marginals.
Proceedings of the 30th Annual Symposium on Computational Geometry, 2014

2013
Toward practicing privacy.
J. Am. Medical Informatics Assoc., 2013

Learning Fair Representations.
Proceedings of the 30th International Conference on Machine Learning, 2013

2012
Differential Privacy and the Power of (Formalizing) Negative Thinking - (Extended Abstract).
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Fairness through awareness.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

The Privacy of the Analyst and the Power of the State.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

2011
Non-Malleability.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Differential Privacy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Special Section on the Fortieth Annual ACM Symposium On Theory Of Computing (STOC 2008).
SIAM J. Comput., 2011

A firm foundation for private data analysis.
Commun. ACM, 2011

Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography.
Commun. ACM, 2011

The Promise of Differential Privacy: A Tutorial on Algorithmic Techniques.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Differential Privacy for Statistics: What we Know and What we Want to Learn.
J. Priv. Confidentiality, 2010

On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy.
J. Priv. Confidentiality, 2010

Differential privacy under continual observation.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

Differential Privacy in New Settings.
Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, 2010

Pan-Private Streaming Algorithms.
Proceedings of the Innovations in Computer Science, 2010

Boosting and Differential Privacy.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

2009
How Efficient Can Memory Checking Be?.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

The Differential Privacy Frontier (Extended Abstract).
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

On the complexity of differentially private data release: efficient algorithms and hardness results.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Differential privacy and robust statistics.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

2008
Differential Privacy: A Survey of Results.
Proceedings of the Theory and Applications of Models of Computation, 2008

New Efficient Attacks on Statistical Disclosure Control Mechanisms.
Proceedings of the Advances in Cryptology, 2008

2007
The First and Fourth Public-Key Cryptosystems with Worst-Case/Average-Case Equivalence..
Electron. Colloquium Comput. Complex., 2007

The price of privacy and the limits of LP decoding.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Privacy, accuracy, and consistency too: a holistic solution to contingency table release.
Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2007

An Ad Omnia Approach to Defining and Achieving Private Data Analysis.
Proceedings of the Privacy, 2007

Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis.
Proceedings of the Database Theory, 2007

2006
An Architecture for Provably Secure Computation.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

On Clusters in Markov Chains.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

Differential Privacy.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
Nonmalleability.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

On Privacy-Preserving Histograms.
Proceedings of the UAI '05, 2005

Toward Privacy in Public Databases.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Practical privacy: the SuLQ framework.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Sub-linear Queries Statistical Databases: Privacy with Power.
Proceedings of the Topics in Cryptology, 2005

Pebbling and Proofs of Work.
Proceedings of the Advances in Cryptology, 2005

2004
Concurrent zero-knowledge.
J. ACM, 2004

List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Fighting Spam: The Science.
Proceedings of the LATIN 2004: Theoretical Informatics, 2004

Immunizing Encryption Schemes from Decryption Errors.
Proceedings of the Advances in Cryptology, 2004

Privacy-Preserving Datamining on Vertically Partitioned Databases.
Proceedings of the Advances in Cryptology, 2004

2003
Nonmalleable Cryptography.
SIAM Rev., 2003

Magic Functions.
J. ACM, 2003

Link Evolution: Analysis and Algorithms.
Internet Math., 2003

On Memory-Bound Functions for Fighting Spam.
Proceedings of the Advances in Cryptology, 2003

2002
Zaps and Their Applications
Electron. Colloquium Comput. Complex., 2002

2-round zero knowledge and proof auditors.
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002

2001
Rank aggregation methods for the Web.
Proceedings of the Tenth International World Wide Web Conference, 2001

1999
Time-Lapse Snapshots.
SIAM J. Comput., 1999

1998
Performing Work Efficiently in the Presence of Faults.
SIAM J. Comput., 1998

An Efficient Existentially Unforgeable Signature Scheme and Its Applications.
J. Cryptol., 1998

Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints.
Proceedings of the Advances in Cryptology, 1998

1997
Contention in shared memory algorithms.
J. ACM, 1997

Positive Applications of Lattices to Cryptography.
Proceedings of the Mathematical Foundations of Computer Science 1997, 1997

1996
Deniable Encryption.
IACR Cryptol. ePrint Arch., 1996

A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence
Electron. Colloquium Comput. Complex., 1996

Collective Consistency.
Proceedings of the Distributed Algorithms, 10th International Workshop, 1996

Digital Signets: Self-Enforcing Protection of Digital Information (Preliminary Version).
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Collective Consistency (Work in Progress, Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

A Digital Library System for Periodicals Distribution.
Proceedings of the Third Forum on Research and Technology Advances in Digital Library, 1996

1995
Distributed computing.
SIGACT News, 1995


1994
Bounds on the Time to Reach Agreement in the Presence of Timing Uncertainty.
J. ACM, 1994

Competitiveness in Distributed Algorithms.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

A Theory of Competitive Analysis for Distributed Algorithms
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994

1993
Perfectly Secure Message Transmission.
J. ACM, 1993

Bounded Round Numbers.
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

1992
Shifting Gears: Changing Algorithms on the Fly to Expedite Byzantine Agreement
Inf. Comput., April, 1992

Finite State Verifiers II: Zero Knowledge.
J. ACM, 1992

Finite State Verifiers I: The Power of Interaction.
J. ACM, 1992

Simple and Efficient Bounded Concurrent Timestamping or Bounded Concurrent Timestamp Systems are Comprehensible!
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992

Pricing via Processing or Combatting Junk Mail.
Proceedings of the Advances in Cryptology, 1992

Low Communication 2-Prover Zero-Knowledge Proofs for NP.
Proceedings of the Advances in Cryptology, 1992

1991
Simultaneity Is Harder than Agreement
Inf. Comput., April, 1991

Non-Malleable Cryptography (Extended Abstract)
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991

On Verification in Secret Sharing.
Proceedings of the Advances in Cryptology, 1991

1990
Knowledge and Common Knowledge in a Byzantine Environment: Crash Failures
Inf. Comput., October, 1990

Distributed computing column.
SIGACT News, 1990

Flipping Persuasively in Constant Time.
SIAM J. Comput., 1990

A Time Complexity Gap for Two-Way Probabilistic Finite-State Automata.
SIAM J. Comput., 1990

Strong Verifiable Secret Sharing (Extended Abstract).
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990

1989
The Distributed Firing Squad Problem.
SIAM J. Comput., 1989

Randomization in Byzantine Agreement.
Adv. Comput. Res., 1989

On the Power of 2-Way Probabilistic Finite State Automata (Extended Abstract)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

1988
Fault Tolerance in Networks of Bounded Degree.
SIAM J. Comput., 1988

Parallel Algorithms for Term Matching.
SIAM J. Comput., 1988

Consensus in the presence of partial synchrony.
J. ACM, 1988

Zero-Knowledge With Finite State Verifiers.
Proceedings of the Advances in Cryptology, 1988

1987
On the minimal synchronism needed for distributed consensus.
J. ACM, 1987

1986
Upper and Lower Time Bounds for Parallel Random Access Machines without Simultaneous Writes.
SIAM J. Comput., 1986

Knowledge and Common Knowledge in a Byzantine Environment I: Crash Failures.
Proceedings of the 1st Conference on Theoretical Aspects of Reasoning about Knowledge, 1986

Fault Tolerance in Networks of Bounded Degree (Preliminary Version)
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986

Flipping Persuasively in Constant Expected Time (Preliminary Version)
Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986

1985
The Distributed Firing Squad Problem (Preliminary Version)
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985

1984
On the Sequential Nature of Unification.
J. Log. Program., 1984

Patterns of Communication in Consensus Protocols.
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, 1984

Consensus in the Presence of Partial Synchrony (Preliminary Version).
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, 1984

1983
Bounds on Fundamental Problems in Parallel and Distributed Computation.
PhD thesis, 1983

Superconcentrators, Generalizers and Generalized Connectors with Limited Depth (Preliminary Version)
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983

The Inherent Cost of Nonblocking Commitment.
Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing, 1983

1982
Bounds on the Time for Parallel RAM's to Compute Simple Functions
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982


  Loading...