Date
|
Speaker
|
Reading
|
January 18, 2013
|
Wuzhou Zhang
|
P. Pedarsani, M. Grossglauser, "On the privacy of anonymized networks", KDD 2011
|
February 1, 2013 |
Xi He
|
R. Popa, C. Redfield, N. Zeldovich, H. Balakrishnan, "CryptDB: Protecting Confidentiality with Encrypted Processing", SOSP 2011
|
February 8, 2013 |
Benjamin Stoddard
|
R. Shokri, G. Theodorakopolous, J. Boudec, JP Hubaux, "Quantifying Location Privacy", IEEE S&P
|
February 15, 2013 |
Jiangwei Pan
|
K. Choromanski, T. Malkin, "The Power of the Dinur-Nissim Algorithm: Breaking Privacy of Statistical and Graph Databases", PODS 2012
|
February 22, 2013 |
|
NEW STUDENT VISIT DAY
|
March 1, 2013
|
Andrew Brown
|
A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossman, R. Ramamurthy, R. Venkateshan "Orthogonal Security with Cypherbase", CIDE 2013
|
March 15, 2013 |
|
SPRING BREAK
|
March 22, 2013 |
Ashwin
|
T. Rekatsinas, A. Deshpande, A. Machanavajjhala, "SPARSI: Partitioning Sensitive Data amongst Multiple Adversaries" (in submission)
|
March 29, 2013 |
Janardhan Kulkarni
|
J. Blocki, A. Blum, A. Datta, O. Sheffet, "Differentially Private Analysis of Social Networks via Restricted Sensitivity", ITCS 2013
|
April 5, 2013
|
Valentin Pistol
|
P. Williams, R. Sion, A. Tomescu, "PrivateFS: A Parallel Oblivious File System", CCS 2012
|
April 12, 2013 |
|
A. Narayan, A. Haeberlen, "DJoin: Differentially Private Join Queries over Distributed Databases", OSDI 2012 |
April 19, 2013 |
|
C. Dwork, M. Naro, T. Pitassi, G. Rothblum, "Differential Privacy under Continual Observation", STOC 2010
|