Travelled to:
1 × Australia
1 × Greece
1 × Japan
2 × Canada
6 × USA
Collaborated with:
∅ B.Lin J.Gehrke A.Machanavajjhala D.Zhang C.Bucila W.M.White J.Lee Y.Wang P.Agrawal C.Olston S.Ben-David Y.Wang Zeyu Ding Guanhong Wang X.Yang D.He W.Huang A.Ororbia Z.Zhou C.L.Giles
Talks about:
privaci (9) data (6) differenti (3) constraint (2) statist (2) librari (2) toward (2) price (2) estim (2) util (2)
Person: Daniel Kifer
DBLP: Kifer:Daniel
Contributed to:
Wrote 17 papers:
- KDD-2015-Kifer #category theory #on the
- On Estimating the Swapping Rate for Categorical Data (DK), pp. 557–566.
- KDD-2015-LeeWK #consistency #constraints #difference #privacy
- Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints (JL, YW, DK), pp. 635–644.
- LICS-2015-Kifer #privacy
- Privacy and the Price of Data (DK), p. 16.
- VLDB-2014-LinK #on the #query
- On Arbitrage-free Pricing for General Data Queries (BRL, DK), pp. 757–768.
- SIGMOD-2013-LinK #estimation #privacy #statistics
- Information preservation in statistical privacy and bayesian estimation of unattributed histograms (BRL, DK), pp. 677–688.
- PODS-2012-KiferM #framework #privacy
- A rigorous and customizable framework for privacy (DK, AM), pp. 77–88.
- SIGMOD-2011-KiferM #privacy
- No free lunch in data privacy (DK, AM), pp. 193–204.
- PODS-2010-KiferL #axiom #privacy #statistics #towards
- Towards an axiomatization of statistical privacy and utility (DK, BRL), pp. 147–158.
- SIGMOD-2009-Kifer #privacy #theorem
- Attacks on privacy and deFinetti’s theorem (DK), pp. 127–138.
- VLDB-2008-AgrawalKO #scalability #scheduling
- Scheduling shared scans of large data files (PA, DK, CO), pp. 958–969.
- SIGMOD-2006-KiferG #dataset #injection
- Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
- VLDB-2004-KiferBG #data type #detection
- Detecting Change in Data Streams (DK, SBD, JG), pp. 180–191.
- PODS-2003-KiferGBW #how
- How to quickly find a witness (DK, JG, CB, WMW), pp. 272–283.
- KDD-2002-BucilaGKW #algorithm #constraints #named
- DualMiner: a dual-pruning algorithm for itemsets with constraints (CB, JG, DK, WMW), pp. 42–51.
- JCDL-2017-YangHHOZKG #identification #learning #library #using
- Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
- POPL-2017-ZhangK #automation #difference #named #privacy #proving #towards
- LightDP: towards automating differential privacy proofs (DZ, DK), pp. 888–901.
- PLDI-2019-WangDWKZ #difference #execution #privacy #proving
- Proving differential privacy with shadow execution (YW, ZD, GW, DK, DZ), pp. 655–669.