1 code implementation • 5 Jun 2017 • Georgios Kellaris, George Kollios, Kobbi Nissim, Adam O'Neill
In this work we present a model for differentially private outsourced database system and a concrete construction, $\mathcal{E}\text{psolute}$, that provably conceals the aforementioned leakages, while remaining efficient and scalable.
Cryptography and Security
1 code implementation • 7 Feb 2016 • Haohan Zhu, Xianrui Meng, George Kollios
The inter-graph node similarity is important in learning a new graph based on the knowledge of an existing graph (transfer learning on graphs) and has applications in biological, communication, and social networks.