Differential privacy: A survey of results C Dwork International conference on theory and applications of models of computation …, 2008 | 6946 | 2008 |
Calibrating noise to sensitivity in private data analysis C Dwork, F McSherry, K Nissim, A Smith Theory of cryptography conference, 265-284, 2006 | 4714 | 2006 |
The algorithmic foundations of differential privacy. C Dwork, A Roth Foundations and Trends in Theoretical Computer Science 9 (3-4), 211-407, 2014 | 2970 | 2014 |
Rank aggregation methods for the web C Dwork, R Kumar, M Naor, D Sivakumar Proceedings of the 10th international conference on World Wide Web, 613-622, 2001 | 2020 | 2001 |
Nonmalleable cryptography D Dolev, C Dwork, M Naor SIAM review 45 (4), 727-784, 2003 | 1831 | 2003 |
Consensus in the presence of partial synchrony C Dwork, N Lynch, L Stockmeyer Journal of the ACM (JACM) 35 (2), 288-323, 1988 | 1830 | 1988 |
Pricing via processing or combatting junk mail C Dwork, M Naor Annual international cryptology conference, 139-147, 1992 | 1536 | 1992 |
Fairness through awareness C Dwork, M Hardt, T Pitassi, O Reingold, R Zemel Proceedings of the 3rd innovations in theoretical computer science …, 2012 | 1314 | 2012 |
Our data, ourselves: Privacy via distributed noise generation C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor Annual International Conference on the Theory and Applications of …, 2006 | 1252 | 2006 |
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography L Backstrom, C Dwork, J Kleinberg Proceedings of the 16th international conference on World Wide Web, 181-190, 2007 | 1184 | 2007 |
On the minimal synchronism needed for distributed consensus D Dolev, C Dwork, L Stockmeyer Journal of the ACM (JACM) 34 (1), 77-97, 1987 | 864 | 1987 |
Practical privacy: the SuLQ framework A Blum, C Dwork, F McSherry, K Nissim Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005 | 820 | 2005 |
Learning fair representations R Zemel, Y Wu, K Swersky, T Pitassi, C Dwork International conference on machine learning, 325-333, 2013 | 817 | 2013 |
A public-key cryptosystem with worst-case/average-case equivalence M Ajtai, C Dwork Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997 | 793 | 1997 |
A firm foundation for private data analysis C Dwork Communications of the ACM 54 (1), 86-95, 2011 | 758 | 2011 |
Concurrent zero-knowledge C Dwork, M Naor, A Sahai Journal of the ACM (JACM) 51 (6), 851-898, 2004 | 667 | 2004 |
Boosting and differential privacy C Dwork, GN Rothblum, S Vadhan 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 51-60, 2010 | 626 | 2010 |
Differential privacy under continual observation C Dwork, M Naor, T Pitassi, GN Rothblum Proceedings of the forty-second ACM symposium on Theory of computing, 715-724, 2010 | 536 | 2010 |
Differential privacy and robust statistics C Dwork, J Lei Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009 | 517 | 2009 |
Perfectly secure message transmission D Dolev, C Dwork, O Waarts, M Yung Journal of the ACM (JACM) 40 (1), 17-47, 1993 | 483 | 1993 |