Gerome Miklau

Orcid: 0000-0003-1369-9239

Affiliations:
  • University of Massachusetts Amherst, USA


According to our database1, Gerome Miklau authored at least 89 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Joint Selection: Adaptively Incorporating Public Information for Private Synthetic Data.
CoRR, 2024

2023
Optimizing Error of High-Dimensional Statistical Queries Under Differential Privacy.
J. Priv. Confidentiality, August, 2023

2022
AIM: An Adaptive and Iterative Mechanism for Differentially Private Synthetic Data.
Proc. VLDB Endow., 2022

Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy.
CoRR, 2022

2021
Investigating Visual Analysis of Differentially Private Data.
IEEE Trans. Vis. Comput. Graph., 2021

Winning the NIST Contest: A scalable and general approach to differentially private synthetic data.
J. Priv. Confidentiality, 2021

Benchmarking Differentially Private Synthetic Data Generation Algorithms.
CoRR, 2021

Differentially Private Algorithms for 2020 Census Detailed DHC Race \& Ethnicity.
CoRR, 2021

HDMM: Optimizing error of high-dimensional statistical queries under differential privacy.
CoRR, 2021

Relaxed Marginal Consistency for Differentially Private Query Answering.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
ϵKTELO: A Framework for Defining Differentially Private Computations.
ACM Trans. Database Syst., 2020

A workload-adaptive mechanism for linear queries under local differential privacy.
Proc. VLDB Endow., 2020

Fair decision making using privacy-protected data.
Proceedings of the FAT* '20: Conference on Fairness, 2020

2019
#8712;: A Framework for Defining Differentially-Private Computations.
SIGMOD Rec., 2019

PrivateSQL: A Differentially Private SQL Query Engine.
Proc. VLDB Endow., 2019

PSynDB: Accurate and Accessible Private Data Generation.
Proc. VLDB Endow., 2019

Privacy Preserving Off-Policy Evaluation.
CoRR, 2019

MithraRanking: A System for Responsible Ranking Design.
Proceedings of the 2019 International Conference on Management of Data, 2019

Graphical-model based estimation and inference for differential privacy.
Proceedings of the 36th International Conference on Machine Learning, 2019

Architecting a Differentially Private SQL Engine.
Proceedings of the 9th Biennial Conference on Innovative Data Systems Research, 2019

2018
Auditing and Forensic Analysis.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

RC-Index: Diversifying Answers to Range Queries.
Proc. VLDB Endow., 2018

Panel: A Debate on Data and Algorithmic Ethics.
Proc. VLDB Endow., 2018

On Obtaining Stable Rankings.
Proc. VLDB Endow., 2018

EKTELO: A Framework for Defining Differentially-Private Computations.
Proceedings of the 2018 International Conference on Management of Data, 2018

A Nutritional Label for Rankings.
Proceedings of the 2018 International Conference on Management of Data, 2018

IoT-Detective: Analyzing IoT Data Under Differential Privacy.
Proceedings of the 2018 International Conference on Management of Data, 2018

2017
A theory of pricing private data.
Commun. ACM, 2017

Fides: Towards a Platform for Responsible Data Science.
Proceedings of the 29th International Conference on Scientific and Statistical Database Management, 2017

Pythia: Data Dependent Differentially Private Algorithm Selection.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

DIAS: Differentially Private Interactive Algorithm Selection using Pythia.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Differentially Private Rank Aggregation.
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017

Differentially Private Learning of Undirected Graphical Models Using Collective Graphical Models.
Proceedings of the 34th International Conference on Machine Learning, 2017

PeGaSus: Data-Adaptive Differentially Private Stream Processing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Lifting the Haze off the Cloud: A Consumer-Centric Market for Database Computation in the Cloud.
Proc. VLDB Endow., 2016

Data, Responsibly (Dagstuhl Seminar 16291).
Dagstuhl Reports, 2016

A Consumer-Centric Market for Database Computation in the Cloud.
CoRR, 2016

Exploring Privacy-Accuracy Tradeoffs using DPComp.
Proceedings of the 2016 International Conference on Management of Data, 2016

Principled Evaluation of Differentially Private Algorithms using DPBench.
Proceedings of the 2016 International Conference on Management of Data, 2016

Data Responsibly: Fairness, Neutrality and Transparency in Data Analysis.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

2015
The matrix mechanism: optimizing linear counting queries under differential privacy.
VLDB J., 2015

Lower Bounds on the Error of Query Sets Under the Differentially-Private Matrix Mechanism.
Theory Comput. Syst., 2015

Collaborative Access Control in WebdamLog.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

2014
A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy.
Proc. VLDB Endow., 2014

A Data- and Workload-Aware Algorithm for Range Queries Under Differential Privacy.
CoRR, 2014

Exponential random graph estimation under differential privacy.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Generating private synthetic databases for untrusted system evaluation.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

2013
Auditing a database under retention policies.
VLDB J., 2013

Introducing Access Control in Webdamlog.
CoRR, 2013

Rule-based application development using Webdamlog.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

Optimal error of query sets under the differentially-private matrix mechanism.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy.
Proc. VLDB Endow., 2012

Measuring the achievable error of query sets under differential privacy
CoRR, 2012

Pricing Aggregate Queries in a Data Marketplace.
Proceedings of the 15th International Workshop on the Web and Databases 2012, 2012

Differential privacy in data publication and analysis.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

2011
Efficient Batch Query Answering Under Differential Privacy
CoRR, 2011

Privacy-aware data management in information networks.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Private Database Synthesis for Outsourced System Evaluation.
Proceedings of the 5th Alberto Mendelzon International Workshop on Foundations of Data Management, 2011

2010
Resisting structural re-identification in anonymized social networks.
VLDB J., 2010

Scalable Probabilistic Databases with Factor Graphs and MCMC.
Proc. VLDB Endow., 2010

Boosting the Accuracy of Differentially Private Histograms Through Consistency.
Proc. VLDB Endow., 2010

Optimizing linear counting queries under differential privacy.
Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2010

Efficient Recovery from False State in Distributed Routing Algorithms.
Proceedings of the NETWORKING 2010, 2010

2009
Auditing and Forensic Analysis.
Proceedings of the Encyclopedia of Database Systems, 2009

Optimizing Histogram Queries under Differential Privacy
CoRR, 2009

Boosting the Accuracy of Differentially-Private Queries Through Consistency
CoRR, 2009

Relationship privacy: output perturbation for queries with joins.
Proceedings of the Twenty-Eigth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2009

Accurate Estimation of the Degree Distribution of Private Networks.
Proceedings of the ICDM 2009, 2009

Auditing a Database under Retention Restrictions.
Proceedings of the 25th International Conference on Data Engineering, 2009

A framework for safely publishing communication traces.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
AuditGuard: a system for database auditing under retention restrictions.
Proc. VLDB Endow., 2008

Resisting structural re-identification in anonymized social networks.
Proc. VLDB Endow., 2008

Analyzing Privacy in Enterprise Packet Trace Anonymization.
Proceedings of the Network and Distributed System Security Symposium, 2008

Self-interested database managers playing the view maintenance game.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
A formal analysis of information disclosure in data exchange.
J. Comput. Syst. Sci., 2007

Threats to privacy in the forensic analysis of database systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Securing history: Privacy and accountability in database systems.
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2005
Managing Integrity for Data Exchanged on the Web.
Proceedings of the Eight International Workshop on the Web & Databases (WebDB 2005), 2005

Asymptotic Conditional Probabilities for Conjunctive Queries.
Proceedings of the Database Theory, 2005

Implementing a Tamper-Evident Database System.
Proceedings of the Advances in Computer Science, 2005

2004
Processing XML streams with deterministic automata and stream indexes.
ACM Trans. Database Syst., 2004

Containment and equivalence for a fragment of XPath.
J. ACM, 2004

Enabling Secure Data Exchange.
IEEE Data Eng. Bull., 2004

Modeling Integrity in Data Exchange.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

2003
The Piazza peer data management project.
SIGMOD Rec., 2003

Controlling Access to Published Data Using Cryptography.
Proceedings of 29th International Conference on Very Large Data Bases, 2003

Processing XML Streams with Deterministic Automata.
Proceedings of the Database Theory, 2003

2002
Cryptographically Enforced Conditional Access for XML.
Proceedings of the Fifth International Workshop on the Web and Databases, 2002

Containment and Equivalence for an XPath Fragment.
Proceedings of the Twenty-first ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2002


  Loading...