Lowering the cost of anonymization

a PhD thesis

Bibliography

[AAG10]    John M Abowd, Fredrik Andersson, Matthew Graham, Lars Vilhuber, and Jeremy Wu. Formal privacy guarantees and analytical validity of onthemap public-use data, 2010.

[ABC20]    Ahmet Aktay, Shailesh Bavadekar, Gwen Cossoul, John Davis, Damien Desfontaines, Alex Fabrikant, Evgeniy Gabrilovich, Krishna Gadepalli, Bryant Gipson, Miguel Guevara, et al. Google covid-19 community mobility reports: Anonymization process description (version 1.0). arXiv preprint arXiv:2004.04145, 2020.

[ABCP13]    Miguel E Andrés, Nicolás E Bordenabe, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013.

[ABK20]    Jayadev Acharya, Keith Bonawitz, Peter Kairouz, Daniel Ramage, and Ziteng Sun. Context aware local differential privacy. In ICML 2020: 37th International Conference on Machine Learning, 2020.

[Abo18a]    John M Abowd. Staring-down the database reconstruction theorem. In Joint Statistical Meetings, Vancouver, BC, 2018.

[Abo18b]    John M Abowd. The us census bureau adopts differential privacy. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pages 2867–2867, 2018.

[ACG16]    Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016.

[ACG18]    Mohammad Alaggan, Mathieu Cunche, and Sébastien Gambs. Privacy-preserving Wi-Fi analytics. Proceedings on Privacy Enhancing Technologies, 2018(2):4–26, 2018.

[ACPP18]    Mário Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Anna Pazii. Local differential privacy on metric spaces: optimizing the trade-off with utility. In 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018.

[ADJ19]    Hilal Asi, John Duchi, and Omid Javidbakht. Element level differential privacy: The right granularity of privacy. arXiv preprint arXiv:1912.04042, 2019.

[ADK19]    Joshua Allen, Bolin Ding, Janardhan Kulkarni, Harsha Nori, Olga Ohrimenko, and Sergey Yekhanin. An algorithmic framework for differentially private data analysis on trusted processors. In Advances in Neural Information Processing Systems, 2019.

[AGK17]    Mohammad Alaggan, Sébastien Gambs, and Anne-Marie Kermarrec. Heterogeneous differential privacy. Journal of Privacy and Confidentiality, 7(2):6, 2017.

[AGM18]    Erfan Aghasian, Saurabh Garg, and James Montgomery. User’s privacy in recommendation systems applying online social network data, a survey and taxonomy. arXiv preprint arXiv:1806.07629, 2018.

[AKM15]    Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, and Hovav Shacham. On subnormal floating point and abnormal timing. In 2015 IEEE Symposium on Security and Privacy, pages 623–639. IEEE, 2015.

[AKMV19]    Kareem Amin, Alex Kulesza, Andres Munoz, and Sergei Vassilvtiskii. Bounding user contributions: A bias-variance trade-off in differential privacy. In Proceedings of the 36th International Conference on Machine Learning, PMLR 97, pages 263–271, 2019.

[AM14]    Vikas G Ashok and Ravi Mukkamala. A scalable and efficient privacy preserving global itemset support approximation using Bloom filters. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 2014.

[And09]    Nate Anderson. “anonymized” data really isn’t—and here’s why not. Ars Technica, 2009.

[apa]    Apache beam.

[api]    Latency analysis dashboard — apigee edge documentation.

[APV19]    Hafiz Asif, Periklis A Papakonstantinou, and Jaideep Vaidya. How to accurately and privately identify anomalies. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019.

[Arr]    Mahmoud Arram. Case study: Differential privacy innovation at bluecore.

[arx]    Arx data anonymization tool.

[ASV13]    John M Abowd, Matthew J Schneider, and Lars Vilhuber. Differential privacy applications to bayesian and linear mixed model estimation. Journal of Privacy and Confidentiality, 2013.

[bas]    Base – bielefeld academic search engine.

[BBDS13]    Jeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet. Differentially private data analysis of social networks via restricted sensitivity. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science. ACM, 2013.

[BBG11]    Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, and Abhradeep Thakurta. Noiseless database privacy. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2011.

[BBG19]    Borja Balle, Gilles Barthe, Marco Gaboardi, Justin Hsu, and Tetsuya Sato. Hypothesis testing interpretations and renyi differential privacy. In AISTATS, pages 2496–2506, 2019.

[BBGG19]    Borja Balle, Gilles Barthe, Marco Gaboardi, and Joseph Geumlek. Privacy amplification by mixing and diffusion mechanisms. In Advances in Neural Information Processing Systems, pages 13298–13308, 2019.

[BBGN19]    Borja Balle, James Bell, Adrià Gascón, and Kobbi Nissim. The privacy blanket of the shuffle model. In Annual International Cryptology Conference, pages 638–667, 2019.

[BCD07]    Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, and Kunal Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 273–282, 2007.

[BD14]    Rina Foygel Barber and John C Duchi. Privacy and statistical risk: Formalisms and minimax bounds. arXiv preprint arXiv:1412.4451, 2014.

[BD19]    Paul Burchard and Anthony Daoud. Empirical differential privacy. arXiv preprint arXiv:1910.12820, 2019.

[BDD20]    Shailesh Bavadekar, Andrew Dai, John Davis, Damien Desfontaines, Ilya Eckstein, Katie Everett, Alex Fabrikant, Gerardo Flores, Evgeniy Gabrilovich, Krishna Gadepalli, Shane Glass, Rayman Huang, Chaitanya Kamath, Dennis Kraft, Akim Kumok, Hinali Marfatia, Yael Mayer, Benjamin Miller, Adam Pearce, Irippuge Milinda Perera, Venky Ramachandran, Karthik Raman, Thomas Roessler, Izhak Shafran, Tomer Shekel, Charlotte Stanton, Jacob Stimes, Mimi Sun, Gregory Wellenius, and Masrour Zoghi. Google covid-19 search trends symptoms dataset: Anonymization process description (version 1.0). arXiv preprint arXiv:2009.01265, 2020.

[BDRS18]    Mark Bun, Cynthia Dwork, Guy N Rothblum, and Thomas Steinke. Composable and versatile privacy via truncated cdp. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. ACM, 2018.

[BDT19]    Debabrota Basu, Christos Dimitrakakis, and Aristide Tossou. Differential privacy for multi-armed bandits: What is it and what is its cost? arXiv preprint arXiv:1905.12298, 2019.

[BEG15]    Gilles Barthe, Thomas Espitau, Benjamin Grégoire, Justin Hsu, Léo Stefanesco, and Pierre-Yves Strub. Relational reasoning via probabilistic coupling. In Logic for Programming, Artificial Intelligence, and Reasoning, pages 387–401. Springer, 2015.

[BEM17]    Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes, and Bernhard Seefeld. Prochlo: Strong privacy for analytics in the crowd. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 2017.

[BF16]    Raef Bassily and Yoav Freund. Typical stability. arXiv preprint arXiv:1604.03336, 2016.

[BGDC18]    Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, and Martin Vechev. DP-finder: Finding differential privacy violations by sampling and optimization. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 508–524. ACM, 2018.

[BGHP16]    Gilles Barthe, Marco Gaboardi, Justin Hsu, and Benjamin Pierce. Programming language techniques for differential privacy. ACM SIGLOG News, 3(1):34–53, 2016.

[BGKS13]    Raef Bassily, Adam Groce, Jonathan Katz, and Adam Smith. Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on. IEEE, 2013.

[BHE18]    Johes Bater, Xi He, William Ehrich, Ashwin Machanavajjhala, and Jennie Rogers. Shrinkwrap: efficient sql query processing in differentially private data federations. Proceedings of the VLDB Endowment, 2018.

[BHR07]    Kevin Beyer, Peter J Haas, Berthold Reinwald, Yannis Sismanis, and Rainer Gemulla. On synopses for distinct-value estimation under multiset operations. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data. ACM, 2007.

[big]    BigQuery technical documentation on functions & operators.

[BKMR14]    Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing. Differential indistinguishability for cryptography with (bounded) weak sources. Grande Region Security and Reliability Day (GRSRD), 2014.

[BLR13]    Avrim Blum, Katrina Ligett, and Aaron Roth. A learning theory approach to noninteractive database privacy. Journal of the ACM (JACM), 2013.

[BNS16]    Raef Bassily, Kobbi Nissim, Adam Smith, Thomas Steinke, Uri Stemmer, and Jonathan Ullman. Algorithmic stability for adaptive data analysis. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing. ACM, 2016.

[BOH08]    Michael Ben-Or and Avinatan Hassidim. The Bayesian learner is optimal for noisy binary search (and pretty good for quantum as well). In 49th Annual IEEE Symposium on Foundations of Computer Science, pages 221–230. IEEE, 2008.

[Bro97]    A. Broder. On the resemblance and containment of documents. In Proceedings of the Compression and Complexity of Sequences 1997, SEQUENCES ’97, pages 21–, 1997.

[BS08]    Justin Brickell and Vitaly Shmatikov. The cost of privacy: destruction of data-mining utility in anonymized data publishing. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 70–78, 2008.

[BS15]    Raef Bassily and Adam Smith. Local, private, efficient protocols for succinct histograms. In Proceedings of the forty-seventh annual ACM symposium on Theory of computing, pages 127–135. ACM, 2015.

[BS16]    Mark Bun and Thomas Steinke. Concentrated differential privacy: Simplifications, extensions, and lower bounds. In Theory of Cryptography Conference. Springer, 2016.

[BSG17]    Vincent Bindschaedler, Reza Shokri, and Carl A Gunter. Plausible deniability for privacy-preserving data synthesis. Proceedings of the VLDB Endowment, 10(5):481–492, 2017.

[BST14]    Raef Bassily, Adam Smith, and Abhradeep Thakurta. Private empirical risk minimization: Efficient algorithms and tight error bounds. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, pages 464–473. IEEE, 2014.

[BST17]    Raef Bassily, Uri Stemmer, Abhradeep Guha Thakurta, et al. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems, pages 2288–2296, 2017.

[BSW18]    Daniel M Bittner, Anand D Sarwate, and Rebecca N Wright. Using noisy binary search for differentially private anomaly detection. In International Symposium on Cyber Security Cryptography and Machine Learning. Springer, 2018.

[BW18]    Borja Balle and Yu-Xiang Wang. Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising. In International Conference on Machine Learning, pages 394–403, 2018.

[BYJK02]    Ziv Bar-Yossef, TS Jayram, Ravi Kumar, D Sivakumar, and Luca Trevisan. Counting distinct elements in a data stream. In International Workshop on Randomization and Approximation Techniques in Computer Science. Springer, 2002.

[CABP13]    Konstantinos Chatzikokolakis, Miguel E Andrés, Nicolás Emilio Bordenabe, and Catuscia Palamidessi. Broadening the scope of differential privacy using metrics. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 2013.

[CB02]    George Casella and Roger L Berger. Statistical inference. Duxbury Pacific Grove, CA, 2002.

[CBY18]    Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, and Hong Zhong. Differentially private location protection with continuous time stamps for vanets. In International Conference on Algorithms and Architectures for Parallel Processing. Springer, 2018.

[CCFC02]    Moses Charikar, Kevin Chen, and Martin Farach-Colton. Finding frequent items in data streams. In International Colloquium on Automata, Languages, and Programming, pages 693–703. Springer, 2002.

[CCMS19]    TH Hubert Chan, Kai-Min Chung, Bruce M Maggs, and Elaine Shi. Foundations of differentially oblivious algorithms. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2019.

[CD18]    Kelsey Campbell-Dollaghan. Sorry, your data can still be identified even if it’s anonymized. Fast Company, 2018.

[CD20]    Rachel Cummings and David Durfee. Individual sensitivity preprocessing for data privacy. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2020.

[CDP19]    Pern Hui Chia, Damien Desfontaines, Irippuge Milinda Perera, Daniel Simmons-Marengo, Chao Li, Wei-Yen Day, Qiushi Wang, and Miguel Guevara. Khyperloglog: Estimating reidentifiability and joinability of large data at scale. In 2019 IEEE Symposium on Security and Privacy (SP), pages 350–364. IEEE, 2019.

[CDSKY20]    Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, and Arkady Yerukhimovich. Differentially-private multi-party sketching for large-scale statistics. Proceedings on Privacy Enhancing Technologies, 3:153–174, 2020.

[cen]    How the census bureau protects your data.

[CEP17]    Kostantinos Chatzikokolakis, Ehab ElSalamouny, Catuscia Palamidessi, Pazii Anna, et al. Methods for location privacy: A comparative overview. Foundations and Trends® in Privacy and Security, 2017.

[CFYD14]    Rui Chen, Benjamin C Fung, Philip S Yu, and Bipin C Desai. Correlated network data publication via differential privacy. The VLDB Journal—The International Journal on Very Large Data Bases, 2014.

[CGKM20]    Lijie Chen, Badih Ghazi, Ravi Kumar, and Pasin Manurangsi. On distributed differential privacy and counting distinct elements. arXiv preprint arXiv:2009.09604, 2020.

[CH08]    Graham Cormode and Marios Hadjieleftheriou. Finding frequent items in data streams. Proceedings of the VLDB Endowment, 1(2):1530–1541, 2008.

[CH16]    Anne-Sophie Charest and Yiwei Hou. On the meaning and limits of empirical differential privacy. Journal of Privacy and Confidentiality, 2016.

[Cha02]    Moses S Charikar. Similarity estimation techniques from rounding algorithms. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 380–388, 2002.

[CIM19]    Kamalika Chaudhuri, Jacob Imola, and Ashwin Machanavajjhala. Capacity bounded differential privacy. In Advances in Neural Information Processing Systems, 2019.

[CKS20]    Clément Canonne, Gautam Kamath, and Thomas Steinke. The discrete gaussian for differential privacy. arXiv preprint arXiv:2004.00010, 2020.

[CM05a]    Graham Cormode and Shan Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55(1):58–75, 2005.

[CM05b]    Graham Cormode and Shanmugavelayutham Muthukrishnan. Space efficient mining of multigraph streams. In Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 271–282, 2005.

[CM06]    Kamalika Chaudhuri and Nina Mishra. When random sampling preserves privacy. In Annual International Cryptology Conference. Springer, 2006.

[CMS11]    Kamalika Chaudhuri, Claire Monteleoni, and Anand D Sarwate. Differentially private empirical risk minimization. Journal of Machine Learning Research, 12(3), 2011.

[CN20]    Aloni Cohen and Kobbi Nissim. Linear program reconstruction in practice. Journal of Privacy and Confidentiality, 10(1), 2020.

[CNSU20]    Aloni Cohen, Aleksandar Nikolov, Zachary Schutzman, and Jonathan Ullman. Reconstruction attacks in practice. DifferentialPrivacy.org, 10 2020. https://differentialprivacy.org/diffix-attack/.

[CO15]    Sébastien Canard and Baptiste Olivier. Differential privacy in distribution and instance-based noise mechanisms. IACR Cryptology ePrint Archive, 2015.

[Col16]    Léo Colisson. L3 internship report: Quantum analog of differential privacy in term of rényi divergence. 2016.

[Cou08]     Transaction Processing Performance Council. TPC-H benchmark specification. http://www.tpc.org/tpch/, 2008.

[CT13]    Chris Clifton and Tamir Tassa. On syntactic anonymity and differential privacy. In 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW). IEEE, 2013.

[CY16]    Paul Cuff and Lanqing Yu. Differential privacy as a mutual information constraint. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016.

[CZ13]    Shixi Chen and Shuigeng Zhou. Recursive mechanism: towards node differential privacy and unrestricted joins. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data. ACM, 2013.

[DA18]    Fatemeh Deldar and Mahdi Abadi. Pldp-td: Personalized-location differentially private data analysis on trajectory databases. Pervasive and Mobile Computing, 2018.

[Dal77]    Tore Dalenius. Towards a methodology for statistical disclosure control. statistik Tidskrift, 1977.

[DBB20]    Ashish Dandekar, Debabrota Basu, and Stéphane Bressan. Differential privacy at risk: Bridging randomness and privacy budget. Proceedings on Privacy Enhancing Technologies, pages 1–21, 2020.

[DDR20]    Jinshuo Dong, David Durfee, and Ryan Rogers. Optimal differential privacy composition for exponential mechanisms. In ICML 2020: 37th International Conference on Machine Learning, 2020.

[Des]    Damien Desfontaines. Personal blog.

[DF03]    Marianne Durand and Philippe Flajolet. Loglog counting of large cardinalities. In European Symposium on Algorithms. Springer, 2003.

[DG10]    Jeffrey Dean and Sanjay Ghemawat. Mapreduce: a flexible data processing tool. Communications of the ACM, 53(1):72–77, 2010.

[DGPP16]    Ilias Diakonikolas, Themis Gouleakis, John Peebles, and Eric Price. Collision-based testers are optimal for uniformity and closeness. Electronic Colloquium on Computational Complexity, 23:178, 2016.

[DGY18]    Kai Dong, Taolin Guo, Haibo Ye, Xuansong Li, and Zhen Ling. On the limitations of existing notions of location privacy. Future Generation Computer Systems, 2018.

[dif]    Diffprivlib: Ibm’s differential privacy library.

[DJRT13]    Kashyap Dixit, Madhav Jha, Sofya Raskhodnikova, and Abhradeep Thakurta. Testing lipschitz property over product distribution and its applications to statistical data privacy. Theory of Cryptography - Lecture Notes in Computer Science, 2013.

[DJW13]    John C Duchi, Michael I Jordan, and Martin J Wainwright. Local privacy and statistical minimax rates. In Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on. IEEE, 2013.

[DKM06]    Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Eurocrypt. Springer, 2006.

[DKY17]    Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. Collecting telemetry data privately. In Advances in Neural Information Processing Systems, 2017.

[DL09]    Cynthia Dwork and Jing Lei. Differential privacy and robust statistics. In Proceedings of the forty-first annual ACM symposium on Theory of computing, pages 371–380, 2009.

[DLB19]    Damien Desfontaines, Andreas Lochbihler, and David Basin. Cardinality estimators do not preserve privacy. Proceedings on Privacy Enhancing Technologies, 2019(2):26–46, 2019.

[dlp]    Computing k-map estimates with cloud dlp.

[DMHVB13]    Yves-Alexandre De Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3:1376, 2013.

[DMKB19]    Damien Desfontaines, Esfandiar Mohammadi, Elisabeth Krahmer, and David Basin. Differential privacy with partial knowledge. arXiv preprint arXiv:1905.00650, 2019.

[DMNS06]    Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference. Springer, 2006.

[DMRS15]    Yves-Alexandre De Montjoye, Laura Radaelli, Vivek Kumar Singh, et al. Unique in the shopping mall: On the reidentifiability of credit card metadata. Science, 347(6221):536–539, 2015.

[DN03]    Irit Dinur and Kobbi Nissim. Revealing information while preserving privacy. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2003.

[DNGRV18]    Thanh Dai Nguyen, Sunil Gupta, Santu Rana, and Svetha Venkatesh. A privacy preserving bayesian optimization with high efficiency. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2018.

[DNP10]    Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N Rothblum, and Sergey Yekhanin. Pan-private streaming algorithms. In ICS, pages 66–80, 2010.

[DNPR10]    Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. Differential privacy under continual observation. In Proceedings of the forty-second ACM symposium on Theory of computing. ACM, 2010.

[DNZ17]    Christos Dimitrakakis, Blaine Nelson, Zuhe Zhang, Aikaterini Mitrokotsa, and Benjamin I. P. Rubinstein. Differential privacy for bayesian inference through posterior sampling. Journal of Machine Learning Research, 18(1):343–381, 2017.

[DP19]    Damien Desfontaines and Balázs Pejó. Differential privacies: a taxonomy of differential privacy variants and extensions (long version). arXiv prpeprint arXiv:1906.01337, 2019.

[DP20]    Damien Desfontaines and Balázs Pejó. Sok: Differential privacies. Proceedings on Privacy Enhancing Technologies, 2020(2), 2020.

[dPCF12]    Flávio du Pin Calmon and Nadia Fawaz. Privacy against statistical inference. In Communication, Control, and Computing (Allerton), 2012 50th Annual Allerton Conference on. IEEE, 2012.

[DPZ18]    Roel Dobbe, Ye Pu, Jingge Zhu, Kannan Ramchandran, and Claire Tomlin. Customized local differential privacy for multi-agent distributed optimization. arXiv preprint arXiv:1806.06035, 2018.

[DR14]    Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 2014.

[DR16]    Cynthia Dwork and Guy N Rothblum. Concentrated differential privacy. arXiv preprint arXiv:1603.01887, 2016.

[DR18]    John C Duchi and Feng Ruan. The right complexity measure in locally private estimation: It is not the fisher information. arXiv preprint arXiv:1806.05756, 2018.

[DR19]    David Durfee and Ryan M Rogers. Practical differentially private top-k selection with pay-what-you-get composition. In Advances in Neural Information Processing Systems, 2019.

[DRS19]    Jinshou Dong, Aaron Roth, and J. Weijie Su. Gaussian differential privacy. arXiv preprint arXiv:1905.02383, 2019.

[DRV10]    Cynthia Dwork, Guy N Rothblum, and Salil Vadhan. Boosting and differential privacy. In Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on, pages 51–60. IEEE, 2010.

[DSCP02]    Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In International Workshop on Privacy Enhancing Technologies, pages 54–68. Springer, 2002.

[Dua09]    Yitao Duan. Privacy without noise. In Proceedings of the 18th ACM conference on Information and knowledge management. ACM, 2009.

[Dwo06]    Cynthia Dwork. Differential privacy. In Proceedings of the 33rd international conference on Automata, Languages and Programming. ACM, 2006.

[Dwo08]    Cynthia Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of Models of Computation. Springer, 2008.

[Dwo09]    Cynthia Dwork. The differential privacy frontier. In Theory of Cryptography Conference. Springer, 2009.

[Dwo10]    Cynthia Dwork. Differential privacy in new settings. In Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2010.

[DWW18]    Zeyu Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, and Daniel Kifer. Detecting violations of differential privacy. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS ’18, pages 475–489, New York, NY, USA, 2018. ACM.

[DWWG13]    Xuan Ding, Wei Wang, Meng Wan, and Ming Gu. Seamless privacy: Privacy-preserving subgraph counting in interactive social network analysis. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013 International Conference on. IEEE, 2013.

[Eck10]    Peter Eckersley. How unique is your web browser? In International Symposium on Privacy Enhancing Technologies Symposium, pages 1–18. Springer, 2010.

[EED08]    Khaled El Emam and Fida Kamal Dankar. Protecting privacy using k-anonymity. Journal of the American Medical Informatics Association, 2008.

[EFG15]    Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, and Jörn Tillmanns. Privately computing set-union and set-intersection cardinality via Bloom filters. In Australasian Conference on Information Security and Privacy. Springer, 2015.

[EFM19]    Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Abhradeep Thakurta. Amplification by shuffling: From local to central differential privacy via anonymity. In Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 2468–2479. SIAM, 2019.

[EFM20]    Úlfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Shuang Song, Kunal Talwar, and Abhradeep Thakurta. Encode, shuffle, analyze privacy revisited: formalizations and empirical evaluation. arXiv preprint arXiv:2001.03618, 2020.

[EG16]    Ehab ElSalamouny and Sébastien Gambs. Differential privacy models for location-based services. Transactions on Data Privacy, 2016.

[EGS03]    Alexandre Evfimievski, Johannes Gehrke, and Ramakrishnan Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2003.

[EPK14]    Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. RAPPOR: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM, 2014.

[ESS15]    Hamid Ebadi, David Sands, and Gerardo Schneider. Differential privacy: Now it’s getting personal. In Acm Sigplan Notices. ACM, 2015.

[EVF03]    Cristian Estan, George Varghese, and Mike Fisk. Bitmap algorithms for counting active flows on high speed links. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. ACM, 2003.

[Far19]    Farhad Farokhi. Noiseless privacy. arXiv preprint arXiv:1910.13027, 2019.

[Far20]    Farhad Farokhi. Temporally discounted differential privacy for evolving datasets on an infinite horizon. In 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS), pages 1–8, 2020.

[FC14]    Chengfang Fang and Ee-Chien Chang. Differential privacy with delta-neighbourhood for spatial and dynamic datasets. In Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, 2014.

[FDM19]    Natasha Fernandes, Mark Dras, and Annabelle McIver. Generalised differential privacy for text document processing. In International Conference on Principles of Security and Trust. Springer, 2019.

[FEM17]    Paul Francis, Sebastian Probst Eide, and Reinhard Munz. Diffix: High-utility database anonymization. In Annual Privacy Forum, pages 141–158. Springer, 2017.

[FFGM08]    Philippe Flajolet, Éric Fusy, Olivier Gandouet, and Frédéric Meunier. HyperLogLog: the analysis of a near-optimal cardinality estimation algorithm. DMTCS Proceedings, 2008.

[FM83]    Philippe Flajolet and G Nigel Martin. Probabilistic counting. In 24th Annual Symposium on Foundations of Computer Science (sfcs 1983), pages 76–82. IEEE, 1983.

[FM85]    Philippe Flajolet and G Nigel Martin. Probabilistic counting algorithms for data base applications. Journal of computer and system sciences, 1985.

[FMTT18]    Vitaly Feldman, Ilya Mironov, Kunal Talwar, and Abhradeep Thakurta. Privacy amplification by iteration. In 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2018.

[FPE16]    Giulia Fanti, Vasyl Pihur, and Úlfar Erlingsson. Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries. Proceedings on Privacy Enhancing Technologies, 2016(3):41–61, 2016.

[FS18]    Vitaly Feldman and Thomas Steinke. Calibrating noise to variance in adaptive data analysis. Proceedings of Machine Learning Research, 2018.

[GAP18]    Simson L Garfinkel, John M Abowd, and Sarah Powazek. Issues encountered deploying differential privacy. In Proceedings of the 2018 Workshop on Privacy in the Electronic Society. ACM, 2018.

[GC19]    Joseph Geumlek and Kamalika Chaudhuri. Profile-based privacy for locally private computations. In 2019 IEEE International Symposium on Information Theory (ISIT), pages 537–541, 2019.

[GDLS14]    Aris Gkoulalas-Divanis, Grigorios Loukides, and Jimeng Sun. Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of biomedical informatics, 50:4–19, 2014.

[GGK20]    Pankaj Gulhane, Sivakanth Gopi, Janardhan Kulkarni, Judy Hanwen Shen, Milad Shokouhi, and Sergey Yekhanin. Differentially private set union. In ICML 2020: 37th International Conference on Machine Learning, 2020.

[GHLP12]    Johannes Gehrke, Michael Hay, Edward Lui, and Rafael Pass. Crowd-blending privacy. In Advances in Cryptology–CRYPTO 2012. Springer, 2012.

[GHR19]    Andrea Gadotti, Florimond Houssiau, Luc Rocher, Benjamin Livshits, and Yves-Alexandre De Montjoye. When the signal is in the noise: exploiting diffix’s sticky noise. In 28th USENIX Security Symposium (USENIX Security 19), pages 1081–1098, 2019.

[GHV20]    Marco Gaboardi, Michael Hay, and Salil Vadhan. A programming framework for opendp. 2020.

[GK17a]    Arpita Ghosh and Robert Kleinberg. Inferential privacy guarantees for differentially private mechanisms. In 8th Innovations in Theoretical Computer Science Conference (ITCS 2017), volume 67, page 3, 2017.

[GK17b]    Krzysztof Grining and Marek Klonowski. Towards extending noiseless privacy: Dependent data and more practical approach. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pages 546–560. ACM, 2017.

[GKPT15]    Rachid Guerraoui, Anne-Marie Kermarrec, Rhicheek Patra, and Mahsa Taziki. D 2 p: distance-based differential privacy in recommenders. Proceedings of the VLDB Endowment, 2015.

[GKS08]    Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, and Adam Smith. Composition attacks and auxiliary information in data privacy. In Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2008.

[GKY11]    Adam Groce, Jonathan Katz, and Arkady Yerukhimovich. Limits of computational differential privacy in the client/server setting. In Theory of Cryptography Conference. Springer, 2011.

[GLP11]    Johannes Gehrke, Edward Lui, and Rafael Pass. Towards privacy for social networks: A zero-knowledge based definition of privacy. In Theory of Cryptography Conference. Springer, 2011.

[GM84]    Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of computer and system sciences, 1984.

[GM18]    Anna C. Gilbert and Audra Mcmillan. Property testing for differential privacy. In 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pages 249–258, 2018.

[GMR89]    Shafi Goldwasser, Silvio Micali, and Charles Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on computing, 1989.

[GMW11]    Michaela Gotz, Ashwin Machanavajjhala, Guozhang Wang, Xiaokui Xiao, and Johannes Gehrke. Publishing search logs—a comparative study of privacy guarantees. IEEE Transactions on Knowledge and Data Engineering, 24(3):520–532, 2011.

[gon]    normal.go — go source code.

[gooa]    Google scholar.

[goob]    Google’s differential privacy library.

[gooc]    How google anonymizes data.

[GP09]    Philippe Golle and Kurt Partridge. On the anonymity of home/work location pairs. Pervasive computing, 2009.

[GR15]    Arpita Ghosh and Aaron Roth. Selling privacy at auction. Games and Economic Behavior, 2015.

[Gra20]    Harriet Grant. “if i die, that is ok”: the calais refugees with nowhere to turn. The Guardian, 2020.

[GRS12]    Arpita Ghosh, Tim Roughgarden, and Mukund Sundararajan. Universally utility-maximizing privacy mechanisms. SIAM Journal on Computing, 41(6):1673–1693, 2012.

[GSC17]    Joseph Geumlek, Shuang Song, and Kamalika Chaudhuri. Renyi differential privacy mechanisms for posterior sampling. In Advances in Neural Information Processing Systems, 2017.

[GTT19]    Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, and Ling Liu. Secure and utility-aware data collection with condensed local differential privacy. IEEE Transactions on Dependable and Secure Computing, pages 1–1, 2019.

[HABMA17]    Naoise Holohan, Spiros Antonatos, Stefano Braghin, and Pól Mac Aonghusa. (k,e)-anonymity: k-anonymity with e-differential privacy. arXiv preprint arXiv:1710.01615, 2017.

[Hal64]    J. H. Halton. Algorithm 247: Radical-inverse quasi-random point sequence. Commun. ACM, 7(12):701–702, December 1964.

[Hal12]    Rob Hall. New Statistical Applications for Differential Privacy. PhD thesis, PhD thesis, Carnegie Mellon, 2012.

[haz]    Hazy.

[HD19]    Yufan Huang and Huaiyu Dai. Quantifying differential privacy of gossip protocols in general networks. arXiv preprint arXiv:1905.07598, 2019.

[HGH14]    Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C Pierce, and Aaron Roth. Differential privacy: An economic method for choosing epsilon. In 2014 IEEE 27th Computer Security Foundations Symposium. IEEE, 2014.

[HKN16]    Alon Halevy, Flip Korn, Natalya F Noy, Christopher Olston, Neoklis Polyzotis, Sudip Roy, and Steven Euijong Whang. Goods: Organizing google’s datasets. In Proceedings of the 2016 International Conference on Management of Data, pages 795–806, 2016.

[HLMJ09]    Michael Hay, Chao Li, Gerome Miklau, and David Jensen. Accurate estimation of the degree distribution of private networks. In Data Mining, 2009. ICDM’09. Ninth IEEE International Conference on. IEEE, 2009.

[HMD14]    Xi He, Ashwin Machanavajjhala, and Bolin Ding. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data. ACM, 2014.

[HMD15]    Samuel Haney, Ashwin Machanavajjhala, and Bolin Ding. Design of policy-aware differentially private algorithms. Proceedings of the VLDB Endowment, 2015.

[HMDDC19]    Jamie Hayes, Luca Melis, George Danezis, and Emiliano De Cristofaro. Logan: Membership inference attacks against generative models. Proceedings on Privacy Enhancing Technologies, 2019(1):133–152, 2019.

[HMFS17]    Xi He, Ashwin Machanavajjhala, Cheryl Flynn, and Divesh Srivastava. Composing differential privacy and secure computation: A case study on scaling private record linkage. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017.

[HMM16a]    Michael Hay, Ashwin Machanavajjhala, Gerome Miklau, Yan Chen, and Dan Zhang. Principled evaluation of differentially private algorithms using dpbench. In Proceedings of the 2016 International Conference on Management of Data, pages 139–154, 2016.

[HMM16b]    Michael Hay, Ashwin Machanavajjhala, Gerome Miklau, Yan Chen, Dan Zhang, and George Bissias. Exploring privacy-accuracy tradeoffs using dpcomp. In Proceedings of the 2016 International Conference on Management of Data, pages 2101–2104, 2016.

[HMQN13]    Matthias Huber, Jörn Müller-Quade, and Tobias Nilges. Defining privacy based on distributions of privacy breaches. In Number Theory and Cryptography. Springer, 2013.

[HMSS19]    Iftach Haitner, Noam Mazor, Ronen Shaltiel, and Jad Silbak. Channels of small log-ratio leakage and characterization of two-party differentially private computation. In Theory of Cryptography Conference. Springer, 2019.

[HNH13]    Stefan Heule, Marc Nunkesser, and Alexander Hall. HyperLogLog in practice: algorithmic engineering of a state of the art cardinality estimation algorithm. In Proceedings of the 16th International Conference on Extending Database Technology. ACM, 2013.

[HPN11]    Andreas Haeberlen, Benjamin C Pierce, and Arjun Narayan. Differential privacy under fire. In USENIX Security Symposium, volume 33, 2011.

[HWR13]    Robert J. Hall, Larry A. Wasserman, and Alessandro Rinaldo. Random differential privacy. Journal of Privacy and Confidentiality, 4(2):3, 2013.

[HZNF15]    Johannes Heurix, Peter Zimmermann, Thomas Neubauer, and Stefan Fenz. A taxonomy for privacy enhancing technologies. Computers & Security, 2015.

[icd]    International classification of diseases, 10th revision.

[Jac02]    Paul Jaccard. Lois de distribution florale dans la zone alpine. 38:69–130, 01 1902.

[java]    nextdouble() in random.java — openjdk 8 source code.

[javb]    nextgaussian() in random.java — openjdk 8 source code.

[JB14]    Márk Jelasity and Kenneth P Birman. Distributional differential privacy for large-scale smart metering. In Proceedings of the 2nd ACM workshop on Information hiding and multimedia security. ACM, 2014.

[JLH19]    Austin Jones, Kevin Leahy, and Matthew Hale. Towards differential privacy for symbolic systems. In 2019 American Control Conference (ACC). IEEE, 2019.

[JLT18]    Bo Jiang, Ming Li, and Ravi Tandon. Context-aware data aggregation with localized information privacy. In 2018 IEEE Conference on Communications and Network Security (CNS), pages 1–9, 2018.

[JN]    Noah Johnson and Joseph P Near. Dataflow analysis & differential privacy for SQL queries.

[JNHS18]    Noah Johnson, Joseph P. Near, Joseph M. Hellerstein, and Dawn Song. Chorus: Differential privacy via query rewriting. arXiv preprint arXiv:1809.07750, 2018.

[JNS18]    Noah Johnson, Joseph P Near, and Dawn Song. Towards practical differential privacy for sql queries. Proceedings of the VLDB Endowment, 2018.

[JYC15]    Zach Jorgensen, Ting Yu, and Graham Cormode. Conservative or liberal? personalized differential privacy. In Data Engineering (ICDE), 2015 IEEE 31st International Conference on. IEEE, 2015.

[KDH20]    Ios Kotsogiannis, Stelios Doudalis, Sam Haney, Ashwin Machanavajjhala, and Sharad Mehrotra. One-sided differential privacy. In 2020 IEEE 36th International Conference on Data Engineering (ICDE), pages 493–504, 2020.

[khl]    Evaluating khll accuracy with bigquery. https://github.com/google/khll-paper-experiments.

[KK07]    Richard M Karp and Robert Kleinberg. Noisy binary search and its applications. In Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, pages 881–890. Society for Industrial and Applied Mathematics, 2007.

[KKMN09]    Aleksandra Korolova, Krishnaram Kenthapadi, Nina Mishra, and Alexandros Ntoulas. Releasing search queries and clicks privately. In Proceedings of the 18th international conference on World wide web, pages 171–180, 2009.

[KKNO17]    Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O’Neill. Accessing data while preserving privacy. arXiv preprint arXiv:1706.01552, 2017.

[KL10]    Daniel Kifer and Bing-Rong Lin. Towards an axiomatization of statistical privacy and utility. In Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2010.

[KL12]    Daniel Kifer and Bing-Rong Lin. An axiomatic view of statistical privacy and utility. Journal of Privacy and Confidentiality, 2012.

[KLL16]    Zohar Karnin, Kevin Lang, and Edo Liberty. Optimal quantile approximation in streams. In 2016 ieee 57th annual symposium on foundations of computer science (focs), pages 71–78. IEEE, 2016.

[KLL19]    Hasan B Kartal, Xiaoping Liu, and Xiao-Bai Li. Differential privacy for the vast majority. ACM Transactions on Management Information Systems (TMIS), 2019.

[KM11]    Daniel Kifer and Ashwin Machanavajjhala. No free lunch in data privacy. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, pages 193–204. ACM, 2011.

[KM12]    Daniel Kifer and Ashwin Machanavajjhala. A rigorous and customizable framework for privacy. In Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems. ACM, 2012.

[KM19a]    Yusuke Kawamoto and Takao Murakami. Local distribution obfuscation via probability coupling. In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019.

[KM19b]    Yusuke Kawamoto and Takao Murakami. Local obfuscation mechanisms for hiding probability distributions. In European Symposium on Research in Computer Security. Springer, 2019.

[KM20]    Vishaal Krishnan and Sonia Martinez. A probabilistic framework for moving-horizon estimation: Stability and privacy guarantees. IEEE Transactions on Automatic Control, pages 1–1, 2020.

[KOV17]    Peter Kairouz, Sewoong Oh, and Pramod Viswanath. The composition theorem for differential privacy. IEEE Transactions on Information Theory, 2017.

[KPRU14]    Michael Kearns, Mallesh Pai, Aaron Roth, and Jonathan Ullman. Mechanism design in large games: Incentives and privacy. In Proceedings of the 5th conference on Innovations in theoretical computer science. ACM, 2014.

[KPXP14]    Georgios Kellaris, Stavros Papadopoulos, Xiaokui Xiao, and Dimitris Papadias. Differentially private event sequences over infinite streams. Proceedings of the VLDB Endowment, 2014.

[Kre19]    Sara Krehbiel. Choosing epsilon for privacy as a service. Proceedings on Privacy Enhancing Technologies, 2019.

[KRWY16]    Michael Kearns, Aaron Roth, Zhiwei Steven Wu, and Grigory Yaroslavtsev. Private algorithms for the protected in social network search. Proceedings of the National Academy of Sciences, 2016.

[KS14]    Shiva P Kasiviswanathan and Adam Smith. On the ’semantics’ of differential privacy: A bayesian formulation. Journal of Privacy and Confidentiality, 2014.

[KS20]    Patrick Kingsley and Karam Shoumali. Taking hard line, greece turns back migrants by abandoning them at sea. The New York Times, 2020.

[KT18]    Krishnaram Kenthapadi and Thanh TL Tran. Pripearl: A framework for privacy-preserving analytics and reporting at linkedin. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management. ACM, 2018.

[KTH19]    Ios Kotsogiannis, Yuchao Tao, Xi He, Maryam Fanaeepour, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. Privatesql: a differentially private sql query engine. Proceedings of the VLDB Endowment, 12(11):1371–1384, 2019.

[KTM19]    Ios Kotsogiannis, Yuchao Tao, Ashwin Machanavajjhala, Gerome Miklau, and Michael Hay. Architecting a differentially private SQL engine. In Conference on Innovative Data Systems Research, 2019.

[LAG19]    Mathias Lecuyer, Vaggelis Atlidakis, Roxana Geambasu, Daniel Hsu, and Suman Jana. Certified robustness to adversarial examples with differential privacy. In 2019 IEEE Symposium on Security and Privacy (S&P). IEEE, 2019.

[LBG17]    Yunhui Long, Vincent Bindschaedler, and Carl A Gunter. Towards measuring membership privacy. arXiv preprint arXiv:1712.09136, 2017.

[LC11]    Jaewoo Lee and Chris Clifton. How much is enough? choosing for differential privacy. In International Conference on Information Security. Springer, 2011.

[LC12]    Jaewoo Lee and Chris Clifton. Differential identifiability. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2012.

[LCM16]    Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. Dependence makes you vulnerable: Differential privacy under dependent tuples. In NDSS, 2016.

[LDR05]    Kristen LeFevre, David J DeWitt, and Raghu Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD international conference on Management of data. ACM, 2005.

[LDR06]    Kristen LeFevre, David J DeWitt, and Raghu Ramakrishnan. Mondrian multidimensional k-anonymity. In Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on. IEEE, 2006.

[lea]    LeapYear.

[Lea19]    Stephen Leahy. Most countries aren’t hitting 2030 climate goals, and everyone will pay the price. National Geographic, 2019.

[LHC19]    Changchang Liu, Xi He, Thee Chanyaswad, Shiqiang Wang, and Prateek Mittal. Investigating statistical privacy frameworks from the perspective of hypothesis testing. Proceedings on Privacy Enhancing Technologies, 2019.

[LHMW14]    Chao Li, Michael Hay, Gerome Miklau, and Yue Wang. A data-and workload-aware algorithm for range queries under differential privacy. Proceedings of the VLDB Endowment, 7(5):341–352, 2014.

[LK18]    Jaewoo Lee and Daniel Kifer. Concentrated differentially private gradient descent with adaptive per-iteration privacy budget. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. ACM, 2018.

[LKCT20]    Jeffrey Li, Mikhail Khodak, Sebastian Caldas, and Ameet Talwalkar. Differentially private meta-learning. In ICLR 2020 : Eighth International Conference on Learning Representations, 2020.

[LL12]    Samantha Leung and Edward Lui. Bayesian mechanism design with efficiency, privacy, and approximate truthfulness. In International Workshop on Internet and Network Economics. Springer, 2012.

[LLSY16]    Ninghui Li, Min Lyu, Dong Su, and Weining Yang. Differential privacy: From theory to practice. Synthesis Lectures on Information Security, Privacy, & Trust, 8(4):1–138, 2016.

[LLV07]    Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007.

[LP15]    Edward Lui and Rafael Pass. Outlier privacy. In Theory of Cryptography Conference. Springer, 2015.

[LP19]    Peeter Laud and Alisa Pankova. Interpreting epsilon of differential privacy in terms of advantage in guessing or approximating sensitive attributes. arXiv preprint arXiv:1911.12777, 2019.

[LPM18]    Peeter Laud, Alisa Pankova, and Pettai Martin. Achieving differential privacy using methods from calculus. arXiv preprint arXiv:1811.06343, 2018.

[LPR20]    Katrina Ligett, Charlotte Peale, and Omer Reingold. Bounded-leakage differential privacy. In 1st Symposium on Foundations of Responsible Computing (FORC 2020). Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2020.

[LQJJ20]    Corinne Le Quéré, Robert B Jackson, Matthew W Jones, Adam JP Smith, Sam Abernethy, Robbie M Andrew, Anthony J De-Gol, David R Willis, Yuli Shan, Josep G Canadell, et al. Temporary reduction in daily global co2 emissions during the covid-19 forced confinement. Nature Climate Change, pages 1–7, 2020.

[LQS11]    Ninghui Li, Wahbeh H Qardaji, and Dong Su. Provably private data anonymization: Or, k-anonymity meets differential privacy. CoRR, abs/1101.2604, 2011.

[LQS12]    Ninghui Li, Wahbeh Qardaji, and Dong Su. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. ACM, 2012.

[LQS13]    Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, and Weining Yang. Membership privacy: a unifying framework for privacy definitions. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013.

[LRYY19]    Yanan Li, Xuebin Ren, Shusen Yang, and Xinyu Yang. Impact of prior knowledge and data correlation on privacy leakage: A unified analysis. IEEE Transactions on Information Forensics and Security, 2019.

[LWS15]    Ziqi Liu, Yu-Xiang Wang, and Alexander Smola. Fast differentially private matrix factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. ACM, 2015.

[LXL13]    Jinfei Liu, Li Xiong, and Jun Luo. Semantic security: Privacy definitions revisited. Trans. Data Privacy, 2013.

[MAEA05]    Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi. Efficient computation of frequent and top-k elements in data streams. In International conference on database theory, pages 398–412. Springer, 2005.

[MB64]    George Marsaglia and Thomas A Bray. A convenient method for generating normal variables. SIAM review, 6(3):260–264, 1964.

[McC15]    David R McClure. Relaxations of differential privacy and risk/utility evaluations of synthetic data and fidelity measures. PhD thesis, Duke University, 2015.

[McSa]    Frank D McSherry. Synthethic data via differential privacy.

[McSb]    Frank D McSherry. Uber’s differential privacy .. probably isn’t.

[McS09]    Frank D McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pages 19–30. ACM, 2009.

[McS17a]    Frank McSherry. On ”differential privacy as a mutual information constraint”, 2017.

[McS17b]    Frank D McSherry. How many secrets do you have?, 2017.

[MDC16]    Luca Melis, George Danezis, and Emiliano De Cristofaro. Efficient private statistics with succinct sketches. In In: Proceedings of the NDSS Symposium 2016. Internet Society: San Diego, CA, USA. (2016), 2016.

[MDH20]    Solomon Messing, Christina DeGregorio, Bennett Hillenbrand, Gary King, Saurav Mahanti, Zagreb Mukerjee, Chaya Nayak, Nate Persily, Bogdan State, and Arjun Wilkins. Urls-v3.pdf. In Facebook Privacy-Protected Full URLs Data Set. Harvard Dataverse, 2020.

[Mei18]    Sebastian Meiser. Approximate and probabilistic differential privacy definitions. Cryptology ePrint Archive, Report 2018/277, 2018.

[MGG09]    Ashwin Machanavajjhala, Johannes Gehrke, and Michaela Götz. Data publishing against realistic adversaries. Proceedings of the VLDB Endowment, 2009.

[MGKV06]    Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. In Data Engineering, 2006. ICDE’06. Proceedings of the 22nd International Conference on. IEEE, 2006.

[MH18]    Ashwin Machanavajjhala and Xi He. Analyzing your location data with provable privacy guarantees. In Handbook of Mobile Data Privacy. Springer, 2018.

[MHKH19]    Takao Murakami, Koki Hamada, Yusuke Kawamoto, and Takuma Hatano. Privacy-preserving multiple tensor factorization for synthesizing large-scale location traces. arXiv preprint arXiv:1911.04226, 2019.

[Mir12]    Ilya Mironov. On significance of the least significant bits for differential privacy. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 650–661. ACM, 2012.

[Mir17]    Ilya Mironov. Renyi differential privacy. In Computer Security Foundations Symposium (CSF), 2017 IEEE 30th. IEEE, 2017.

[MK19]    Takao Murakami and Yusuke Kawamoto. Utility-optimized local differential privacy mechanisms for distribution estimation. In 28th USENIX Security Symposium (USENIX Security 19), 2019.

[MKA08]    Ashwin Machanavajjhala, Daniel Kifer, John Abowd, Johannes Gehrke, and Lars Vilhuber. Privacy: Theory meets practice on the map. In Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. IEEE Computer Society, 2008.

[MM18]    Sebastian Meiser and Esfandiar Mohammadi. Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS). ACM, 2018.

[Mor18]    Jack Morse. Sorry, your ’anonymized’ data probably isn’t anonymous. Mashable, 2018.

[MPRV09]    Ilya Mironov, Omkant Pandey, Omer Reingold, and Salil Vadhan. Computational differential privacy. In Advances in Cryptology-CRYPTO 2009. Springer, 2009.

[MRL98]    Gurmeet Singh Manku, Sridhar Rajagopalan, and Bruce G Lindsay. Approximate medians and other quantiles in one pass and with limited memory. ACM SIGMOD Record, 27(2):426–435, 1998.

[MRTZ18]    H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. Learning differentially private recurrent language models. In ICLR 2018 : International Conference on Learning Representations 2018, 2018.

[MW04]    Adam Meyerson and Ryan Williams. On the complexity of optimal k-anonymity. In Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 223–228, 2004.

[MWP13]    Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady Andrienko, and Natalia Andrienko. Privacy-preserving distributed movement data aggregation. In Geographic Information Science at the Heart of Europe. Springer, 2013.

[NAC07]    Mehmet Ercan Nergiz, Maurizio Atzori, and Chris Clifton. Hiding the presence of individuals from shared databases. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data. ACM, 2007.

[NAD14]    Nadia Niknami, Mahdi Abadi, and Fatemeh Deldar. Spatialpdp: A personalized differentially private mechanism for range counting queries over spatial databases. In Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on. IEEE, 2014.

[nas]    The effects of climate change.

[NC09]    Mehmet Ercan Nergiz and Chris Clifton. -presence without complete world knowledge. IEEE Transactions on Knowledge and Data Engineering, 22(6):868–883, 2009.

[ND15]    Maurizio Naldi and Giuseppe D’Acquisto. Differential privacy: an estimation theory-based method for choosing epsilon. arXiv preprint arXiv:1510.00917, 2015.

[NFPH15]    Arjun Narayan, Ariel Feldman, Antonis Papadimitriou, and Andreas Haeberlen. Verifiable differential privacy. In Proceedings of the Tenth European Conference on Computer Systems, pages 1–14, 2015.

[NH12]    Arjun Narayan and Andreas Haeberlen. DJoin: differentially private join queries over distributed databases. In Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12), pages 149–162, 2012.

[Noz19]    Erfan Nozari. Networked Dynamical Systems: Privacy, Control, and Cognition. PhD thesis, UC San Diego, 2019.

[NR19]    Boel Nelson and Jenni Reuben. Chasing accuracy and privacy, and catching both: A literature survey on differentially private histogram publication. arXiv preprint arXiv:1910.14028, 2019.

[NRS07]    Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. Smooth sensitivity and sampling in private data analysis. In Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. ACM, 2007.

[NS08]    Arvind Narayanan and Vitaly Shmatikov. Robust de-anonymization of large sparse datasets. In 2008 IEEE Symposium on Security and Privacy (S&P), pages 111–125. IEEE, 2008.

[NSH18]    Milad Nasr, Reza Shokri, and Amir Houmansadr. Machine learning with membership privacy using adversarial regularization. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pages 634–646, 2018.

[NSW17]    Kobbi Nissim, Thomas Steinke, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, David R O’Brien, and Salil Vadhan. Differential privacy: A primer for a non-technical audience. In Privacy Law Scholars Conf, 2017.

[NV20]    Moni Naor and Neil Vexler. Can two walk together: Privacy enhancing methods and preventing tracking of users. 1st Symposium on Foundations of Responsible Computing (FORC 2020), page 20, 2020.

[NYH18]    Yiwen Nie, Wei Yang, Liusheng Huang, Xike Xie, Zhenhua Zhao, and Shaowei Wang. A utility-optimized framework for personalized private histogram estimation. IEEE Transactions on Knowledge and Data Engineering, 2018.

[ope]    Open differential privacy.

[PBM03]    Sriram Padmanabhan, Bishwaranjan Bhattacharjee, Tim Malkemus, Leslie Cranston, and Matthew Huras. Multi-dimensional clustering: A new data layout scheme in db2. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data. ACM, 2003.

[Per]    Kelly Percival. Federal laws that protect census confidentiality.

[PG]    Milinda Perera and Miguel Guevara. Improving usability of differential privacy at scale.

[PGM14]    Davide Proserpio, Sharon Goldberg, and Frank McSherry. Calibrating data to sensitivity in private data analysis: a platform for differentially-private analysis of weighted datasets. Proceedings of the VLDB Endowment, 2014.

[pho]    Phoenix arizona population and demographics resources.

[Pin18]    Rafael Pinot. Minimum spanning tree release under differential privacy constraints. arXiv preprint arXiv:1801.06423, 2018.

[pos]    PostgreSQL extension extension adding hyperloglog data structures as a native data type.

[Pou20]    Jack Poulson. Reports of a silicon valley/military divide have been greatly exaggerated. Tech Inquiry, 2020.

[PPY19]    Sarvar Patel, Giuseppe Persiano, and Kevin Yeo. What storage access privacy is achievable with small overhead? In Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2019.

[pria]    Computing private statistics with privacy on beam.

[prib]    Privacy on beam.

[pric]    Tolerance calculation for approxequals in tests — privacy on beam.

[proa]    Protocol buffers.

[prob]    Semantic types of protocol buffer fields can be annotated using custom options.

[Proc]    Harvard Privacy Tools Project. Randomness and noise.

[PSN10]    Odysseas Papapetrou, Wolf Siberski, and Wolfgang Nejdl. Cardinality estimation and dynamic length adaptation for Bloom filters. Distributed and Parallel Databases, 2010.

[PTB19]    Balazs Pejo, Qiang Tang, and Gergely Biczók. Together or alone: The price of privacy in collaborative learning. Proceedings on Privacy Enhancing Technologies, 2019.

[PTC18]    Apostolos Pyrgelis, Carmela Troncoso, and Emiliano De Cristofaro. Knock knock, who’s there? membership inference on aggregate location data. In In: Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018). Internet Society: San Diego, CA, USA. (2018), 2018.

[PYGA19]    Rafael Pinot, Florian Yger, Cedric Gouy-Pailler, and Jamal Atif. A unified view on differential privacy and robustness to adversarial examples. In Workshop on Machine Learning for CyberSecurity at ECMLPKDD 2019, 2019.

[pyta]    normalvariate() in random.py — python 3.4 source code.

[pytb]    random() in random.py — python 3.4 source code.

[RA17]    Benjamin IP Rubinstein and Francesco Aldà. Pain-free random differential privacy with sensitivity sampling. In Proceedings of the 34th International Conference on Machine Learning-Volume 70. JMLR. org, 2017.

[Reu18]    Jenni Reuben. Towards a differential privacy theory for edge-labeled directed graphs. SICHERHEIT 2018, 2018.

[RHDM19]    Luc Rocher, Julien M Hendrickx, and Yves-Alexandre De Montjoye. Estimating the success of re-identifications in incomplete datasets using generative models. Nature communications, 10(1):1–9, 2019.

[RHMS09]    Vibhor Rastogi, Michael Hay, Gerome Miklau, and Dan Suciu. Relationship privacy: output perturbation for queries with joins. In Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. ACM, 2009.

[RMF10]    David Rebollo-Monedero and Jordi Forné. Optimized query forgery for private information retrieval. IEEE Transactions on Information Theory, 2010.

[RMFDF10]    David Rebollo-Monedero, Jordi Forne, and Josep Domingo-Ferrer. From t-closeness-like privacy to postrandomization via information theory. IEEE Transactions on Knowledge and Data Engineering, 2010.

[Rot10]    Aaron Roth. New algorithms for preserving differential privacy. Microsoft Research, 2010.

[RSK10]    Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, and Emmett Witchel. Airavat: Security and privacy for mapreduce. In NSDI, volume 10, pages 297–312, 2010.

[RSP20]    Ryan Rogers, Subbu Subramaniam, Sean Peng, David Durfee, Seunghyun Lee, Santosh Kumar Kancha, Shraddha Sahay, and Parvez Ahammad. Linkedin’s audience engagements api: A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839, 2020.

[RT20]    Pedro Reviriego and Daniel Ting. Security of hyperloglog (hll) cardinality estimation: Vulnerabilities and protection. IEEE Communications Letters, 24(5):976–980, 2020.

[Sam01]    Pierangela Samarati. Protecting respondents identities in microdata release. IEEE transactions on Knowledge and Data Engineering, 2001.

[SCDFSM17]   Jordi Soria-Comas, Josep Domingo-Ferrer, David Sánchez, and David Megías. Individual differential privacy: A utility-preserving formulation of differential privacy guarantees. IEEE Transactions on Information Forensics and Security, 2017.

[SCR11]    Elaine Shi, HTH Chan, Eleanor Rieffel, Richard Chow, and Dawn Song. Privacy-preserving aggregation of time-series data. In Annual Network & Distributed System Security Symposium (NDSS). Internet Society., 2011.

[sdc]    sdcmicro: Statistical disclosure control methods for anonymization of data and risk estimation.

[SDNR96]    Amit Shukla, Prasad Deshpande, Jeffrey F Naughton, and Karthikeyan Ramasamy. Storage estimation for multidimensional aggregates in the presence of hierarchies. In VLDB, 1996.

[Sea16]    Adam Sealfon. Shortest paths and distances with differential privacy. In Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. ACM, 2016.

[sec]    The secreta system.

[Ser19]    Adam Serwer. A crime by any name. The Atlantic, 2019.

[SGD14]    Shayak Sen, Saikat Guha, Anupam Datta, Sriram K Rajamani, Janice Tsai, and Jeannette M Wing. Bootstrapping privacy compliance in big data systems. In 2014 IEEE Symposium on Security and Privacy, pages 327–342. IEEE, 2014.

[SMM19]    David M Sommer, Sebastian Meiser, and Esfandiar Mohammadi. Privacy loss classes: The central limit theorem in differential privacy. Proceedings on Privacy Enhancing Technologies, 2019.

[SMS19]    Alexandre Sablayrolles, Douze Matthijs, Cordelia Schmid, Yann Ollivier, and Herve Jegou. White-box vs black-box: Bayes optimal strategies for membership inference. In ICML 2019 : Thirty-sixth International Conference on Machine Learning, volume 97, pages 5558–5567, 2019.

[spa]    Approximate algorithms in apache spark: HyperLogLog and quantiles.

[SS98]    Pierangela Samarati and Latanya Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, technical report, SRI International, 1998.

[SSB16]    Sean Simmons, Cenk Sahinalp, and Bonnie Berger. Enabling privacy-preserving gwass in heterogeneous human populations. Cell systems, 2016.

[SSSS17]    Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP), pages 3–18. IEEE, 2017.

[SU]    Thomas Steinke and Jonathan Ullman. The pitfalls of average-case differential privacy.

[Swe01]    Latanya Sweeney. Computational disclosure control: a primer on data privacy protection. PhD thesis, Massachusetts Institute of Technology, 2001.

[Swe02a]    Latanya Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002.

[Swe02b]    Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002.

[Swe15]    Latanya Sweeney. Only you, your doctor, and many others may know. Technology Science, 2015092903(9):29, 2015.

[SXK19]    Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Hui Wendy Wang, and Ting Yu. Analyzing subgraph statistics from extended local views with decentralized differential privacy. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2019.

[Szy]    Ben Szymkow. Roadmap to differential privacy for all.

[TC12]    Christine Task and Chris Clifton. A guide to differential privacy theory in social network analysis. In Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012). IEEE Computer Society, 2012.

[TCAY19]    Shun Takagi, Yang Cao, Yasuhito Asano, and Masatoshi Yoshikawa. Geo-graph-indistinguishability: Protecting location privacy for lbs over road networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 2019.

[TD16]    Aristide CY Tossou and Christos Dimitrakakis. Algorithms for differentially private multi-armed bandits. In Thirtieth AAAI Conference on Artificial Intelligence, 2016.

[TDG16]    Raphael R Toledo, George Danezis, and Ian Goldberg. Lower-cost e-private information retrieval. Proceedings on Privacy Enhancing Technologies, 2016.

[Tea]    Google Differential Privacy Team. Secure noise generation.

[Tea17]    Differential Privacy Team. Learning with privacy at scale. Apple, 2017.

[TF20]    Aleksei Triastcyn and Boi Faltings. Bayesian differential privacy for machine learning. In ICML 2020: 37th International Conference on Machine Learning, 2020.

[TKB17]    Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. Privacy loss in apple’s implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753, 2017.

[TS13]    Florian Tschorsch and Björn Scheuermann. An algorithm for privacy-preserving distributed user statistics. Computer Networks, 2013.

[TSD20]    Michael Carl Tschantz, Shayak Sen, and Anupam Datta. Sok: Differential privacy as a causal property. In 2020 IEEE Symposium on Security and Privacy (SP), 2020.

[tsq]    HyperLogLog implementation for mssql.

[tum]    Tumult labs.

[us-10]    Decennial census of population and housing, 2010.

[utd]    Utd anonymization toolbox.

[Vad17]    Salil Vadhan. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography, pages 347–450. Springer, 2017.

[VAL18]    Giridhari Venkatadri, Athanasios Andreou, Yabing Liu, Alan Mislove, Krishna P. Gummadi, Patrick Loiseau, and Oana Goga. Privacy risks with facebook’s pii-based targeting: Auditing a data broker’s advertising interface. pages 89–107, 2018.

[vVT19]    Saskia Nuñez von Voigt and Florian Tschorsch. Rrtxfm: Probabilistic counting for differentially private statistics. In Conference on e-Business, e-Services and e-Society, pages 86–98. Springer, 2019.

[Wan17]    Yu-Xiang Wang. Per-instance differential privacy and the adaptivity of posterior sampling in linear and ridge regression. arXiv preprint arXiv:1707.07708, 2017.

[War65]    Stanley L Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 1965.

[Was13]    Larry Wasserman. All of statistics: a concise course in statistical inference. Springer Science & Business Media, 2013.

[WBK19]    Yu-Xiang Wang, Borja Balle, and Shiva Prasad Kasiviswanathan. Subsampled rényi differential privacy and analytical moments accountant. In The 22nd International Conference on Artificial Intelligence and Statistics, pages 1226–1235, 2019.

[WCM18]    Sameer Wagh, Paul Cuff, and Prateek Mittal. Differentially private oblivious ram. Proceedings on Privacy Enhancing Technologies, 2018.

[WCR18]    Peter Waldman, Lizette Chapman, and Jordan Robertson. Palantir knows everything about you. Bloomberg, 2018.

[WDN17]    Xiaotong Wu, Wanchun Dou, and Qiang Ni. Game theory based privacy preserving analysis in correlated data publication. In Proceedings of the Australasian Computer Science Week Multiconference. ACM, 2017.

[WE18]    Isabel Wagner and David Eckhoff. Technical privacy metrics: a systematic survey. ACM Computing Surveys (CSUR), 2018.

[Wei20]    Adam Weinstein. This is fascism. The New Republic, 2020.

[WFWP09]    Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, and Jian Pei. Anonymization-based attacks in privacy-preserving data publishing. ACM Transactions on Database Systems (TODS), 34(2):1–46, 2009.

[WHWX16]    Genqiang Wu, Yeping He, Jingzheng Wu, and Xianyao Xia. Inherit differential privacy in distributed setting: Multiparty randomized function computation. In Trustcom/BigDataSE/I SPA, 2016 IEEE. IEEE, 2016.

[WLF16]    Yu-Xiang Wang, Jing Lei, and Stephen E Fienberg. On-average kl-privacy and its equivalence to generalization for max-entropy mechanisms. In International Conference on Privacy in Statistical Databases. Springer, 2016.

[WSMD20]    Yu Wang, Hussein Sibai, Sayan Mitra, and Geir E Dullerud. Differential privacy for sequential algorithms. arXiv preprint arXiv:2004.00275, 2020.

[WVZT90]    Kyu-Young Whang, Brad T Vander-Zanden, and Howard M Taylor. A linear-time probabilistic counting algorithm for database applications. ACM Transactions on Database Systems (TODS), 1990.

[WWK17]    Xiaotong Wu, Taotao Wu, Maqbool Khan, Qiang Ni, and Wanchun Dou. Game theory based correlated privacy preserving analysis in big data. IEEE Transactions on Big Data, 2017.

[WXH17]    Genqiang Wu, Xianyao Xia, and Yeping He. Information theory of data privacy. arXiv preprint arXiv:1703.07474, 2017.

[WYZ16]    Weina Wang, Lei Ying, and Junshan Zhang. On the relation between identifiability, differential privacy, and mutual-information privacy. IEEE Transactions on Information Theory, 2016.

[WZ10]    Larry Wasserman and Shuheng Zhou. A statistical framework for differential privacy. Journal of the American Statistical Association, 2010.

[WZL20]    Royce J Wilson, Celia Yuxin Zhang, William Lam, Damien Desfontaines, Daniel Simmons-Marengo, and Bryant Gipson. Differentially private sql with bounded user contribution. Proceedings on Privacy Enhancing Technologies, 2020(2), 2020.

[XT07]    Xiaokui Xiao and Yufei Tao. M-invariance: towards privacy preserving re-publication of dynamic datasets. In Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pages 689–700, 2007.

[XTL17]    Fengli Xu, Zhen Tu, Yong Li, Pengyu Zhang, Xiaoming Fu, and Depeng Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th international conference on world wide web, pages 1241–1250, 2017.

[XX15]    Yonghui Xiao and Li Xiong. Protecting locations with differential privacy under temporal correlations. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.

[XZC17]    Qingjun Xiao, You Zhou, and Shigang Chen. Better with fewer bits: Improving the performance of cardinality estimation of large data streams. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1–9. IEEE, 2017.

[YLL17]    Ziqi Yan, Jiqiang Liu, Gang Li, Zhen Han, and Shuo Qiu. Privmin: Differentially private minhash for jaccard similarity computation. arXiv preprint arXiv:1705.07258, 2017.

[YSN15]    Bin Yang, Issei Sato, and Hiroshi Nakagawa. Bayesian differential privacy on correlated data. In Proceedings of the 2015 ACM SIGMOD international conference on Management of Data. ACM, 2015.

[YW17]    Yun William Yu and Griffin M Weber. Hyperminhash: Minhash in loglog space. arXiv preprint arXiv:1710.08436, 2017.

[YWJ05]    Chao Yao, X Sean Wang, and Sushil Jajodia. Checking for k-anonymity violation by views. In Proceedings of the 31st international conference on Very large data bases, pages 910–921, 2005.

[YWW13]    Xiaowei Ying, Xintao Wu, and Yue Wang. On linear refinement of differential privacy-preserving query answering. In Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, 2013.

[Zen19]    Adrian Zenz. ‘thoroughly reforming them towards a healthy heart attitude’: China’s political re-education campaign in xinjiang. Central Asian Survey, 38(1):102–128, 2019.

[ZG02]    Xiaojin Zhu and Zoubin Ghahramani. Learning from labeled and unlabeled data with label propagation. Tech. Rep., Technical Report CMU-CALD-02–107, Carnegie Mellon University, 2002.

[ZJB07]    Lei Zhang, Sushil Jajodia, and Alexander Brodsky. Information disclosure under realistic assumptions: Privacy versus optimality. In Proceedings of the 14th ACM conference on Computer and communications security, pages 573–583, 2007.

[ZLR13]    Tianqing Zhu, Gang Li, Yongli Ren, Wanlei Zhou, and Ping Xiong. Differential privacy for neighborhood-based collaborative filtering. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. ACM, 2013.

[ZLW09]    Shuheng Zhou, Katrina Ligett, and Larry Wasserman. Differential privacy with compression. In Information Theory, 2009. ISIT 2009. IEEE International Symposium on. IEEE, 2009.

[ZMK18]    Dan Zhang, Ryan McKenna, Ios Kotsogiannis, Michael Hay, Ashwin Machanavajjhala, and Gerome Miklau. Ektelo: A framework for defining differentially-private computations. In Proceedings of the 2018 International Conference on Management of Data, pages 115–130, 2018.

[ZQZ15]    Zijian Zhang, Zhan Qin, Liehuang Zhu, Wei Jiang, Chen Xu, and Kui Ren. Toward practical differential privacy in smart grid with capacity-limited rechargeable batteries, 2015.

[ZSZ18]    Jinxue Zhang, Jingchao Sun, Rui Zhang, Yanchao Zhang, and Xia Hu. Privacy-preserving social media data outsourcing. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2018.

[ZWB19]    Jun Zhao, Teng Wang, Tao Bai, Kwok-Yan Lam, Xuebin Ren, Xinyu Yang, Shuyu Shi, Yang Liu, and Han Yu. Reviewing and improving the gaussian mechanism for differential privacy. arXiv preprint arXiv:1911.12060, 2019.

[ZXLZ15]    Tianqing Zhu, Ping Xiong, Gang Li, and Wanlei Zhou. Correlated differential privacy: hiding information in non-iid data set. IEEE Transactions on Information Forensics and Security, 2015.

All opinions here are my own, not my employers.
I'm always glad to get feedback! If you'd like to contact me, please do so via e-mail (se.niatnofsed@neimad) or Twitter (@TedOnPrivacy).