Search Results for author: George Kollios

Found 2 papers, 2 papers with code

$\mathcal{E}\text{psolute}$: Efficiently Querying Databases While Providing Differential Privacy

1 code implementation5 Jun 2017 Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill

In this work we present a model for differentially private outsourced database system and a concrete construction, $\mathcal{E}\text{psolute}$, that provably conceals the aforementioned leakages, while remaining efficient and scalable.

Cryptography and Security

NED: An Inter-Graph Node Metric Based On Edit Distance

1 code implementation7 Feb 2016 Haohan Zhu, Xianrui Meng, George Kollios

The inter-graph node similarity is important in learning a new graph based on the knowledge of an existing graph (transfer learning on graphs) and has applications in biological, communication, and social networks.

Transfer Learning

Cannot find the paper you are looking for? You can Submit a new open access paper.