Applying Differential Privacy to Matrix Factorization, Proceedings of the 9th ACM Conference on Recommender Systems, RecSys '15, pp.107-114, 2015. ,
DOI : 10.1145/2792838.2800173
Training with Noise is Equivalent to Tikhonov Regularization, Neural Computation, vol.1, issue.1, pp.108-116, 1995. ,
DOI : 10.1162/neco.1994.6.1.147
"You Might Also Like:" Privacy Risks of Collaborative Filtering, 2011 IEEE Symposium on Security and Privacy, pp.231-246, 2011. ,
DOI : 10.1109/SP.2011.40
Finding frequent items in data streams, ICALP, 2002. ,
Differentially private empirical risk minimization, J. Mach. Learn. Res, vol.12, pp.1069-1109, 2011. ,
Sketch techniques for approximate query processing, FnTD. NOW publishers, 2011. ,
An improved data stream summary: the count-min sketch and its applications, Journal of Algorithms, vol.55, issue.1, pp.58-75, 2005. ,
DOI : 10.1016/j.jalgor.2003.12.001
Encyclopedia of Cryptography and Security, chapter Differential Privacy Data mining with differential privacy, SIGKDD, KDD '10, pp.338-340, 2010. ,
Approximate nearest neighbors, Proceedings of the thirtieth annual ACM symposium on Theory of computing , STOC '98, pp.604-613, 1998. ,
DOI : 10.1145/276698.276876
Differentially private online learning, 2011. ,
Differential privacy and machine learning: a survey and review. CoRR, abs/1412, 2014. ,
On differentially private low rank approximation, In ACM-SIAM, pp.1395-1414, 2013. ,
DOI : 10.1137/1.9781611973105.101
Collaborative filtering on a budget, AISTATS, 2010. ,
What Can We Learn Privately?, SIAM Journal on Computing, vol.40, issue.3, pp.793-826, 2011. ,
DOI : 10.1137/090756090
Matrix Factorization Techniques for Recommender Systems, Computer, vol.42, issue.8, pp.30-37, 2009. ,
DOI : 10.1109/MC.2009.263
Fast Differentially Private Matrix Factorization, Proceedings of the 9th ACM Conference on Recommender Systems, RecSys '15, pp.171-178, 2015. ,
DOI : 10.1145/2792838.2800191
Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.627-636, 2009. ,
DOI : 10.1145/1557019.1557090
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Efficient private statistics with succinct sketches, 1508. ,
Privacy via pseudorandom sketches, Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '06, pp.143-152, 2006. ,
DOI : 10.1145/1142351.1142373
Privacy-preserving matrix factorization, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.801-812, 2013. ,
DOI : 10.1145/2508859.2516751
Smooth sensitivity and sampling in private data analysis, Proceedings of the thirty-ninth annual ACM symposium on Theory of computing , STOC '07, pp.75-84, 2007. ,
DOI : 10.1145/1250790.1250803
Signal Processing and Machine Learning with Differential Privacy: Algorithms and Challenges for Continuous Data, IEEE Signal Processing Magazine, vol.30, issue.5, pp.86-94, 2013. ,
DOI : 10.1109/MSP.2013.2259911
(non-) asymptotic properties of stochastic gradient langevin dynamics, 2015. ,
Privacy for free: Posterior sampling and stochastic gradient monte carlo, 2015. ,
Bayesian learning via stochastic gradient langevin dynamics, ICML, pp.681-688, 2011. ,
Sketching as a tool for numerical linear algebra. arXiv preprint, 2014. ,