Login / Signup
Proving differential privacy with shadow execution.
Yuxin Wang
Zeyu Ding
Guanhong Wang
Daniel Kifer
Danfeng Zhang
Published in:
PLDI (2019)
Keyphrases
</>
differential privacy
differentially private
privacy preserving
private data
privacy guarantees
tabular data
privacy preserving data mining algorithms
privacy preservation
data privacy
personal information
data sharing
database
social networks
digital libraries
anonymized data