Adam D. Smith
Orcid: 0000-0001-9393-1127Affiliations:
- Boston University, Department of Computer Science, Boston, MA, USA
- Pennsylvania State University, Computer Science and Engineering Department, University Park, PA, USA (2007-2017)
- Weizmann Institute of Science, Department of Computer Science and Applied Mathematics, Rehovot, Israel (former)
- McGill University, Montréal, School of Computer Science, CA (former)
- MIT, Computer Science and AI Lab, Cambridge, MA, USA (1999-2004)
According to our database1,
Adam D. Smith
authored at least 119 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
The Last Iterate Advantage: Empirical Auditing and Principled Heuristic Analysis of Differentially Private SGD.
CoRR, 2024
Time-Aware Projections: Truly Node-Private Graph Statistics under Continual Observation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
Proceedings of the 42nd ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2023
Counting Distinct Elements in the Turnstile Model with Differential Privacy under Continual Observation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the 50th International Colloquium on Automata, Languages, and Programming, 2023
Fast, Sample-Efficient, Affine-Invariant Private Mean and Covariance Estimation for Subgaussian Distributions.
Proceedings of the Thirty Sixth Annual Conference on Learning Theory, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Improved Differential Privacy for SGD via Optimal Private Linear Operators on Adaptive Streams.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Conference on Learning Theory, 2-5 July 2022, London, UK., 2022
2021
CoRR, 2021
When is memorization of irrelevant training data necessary for high-accuracy learning?
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
Empirical Risk Minimization in the Non-interactive Local Model of Differential Privacy.
J. Mach. Learn. Res., 2020
The Flajolet-Martin Sketch Itself Preserves Differential Privacy: Private Counting with Minimal Space.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020
2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019
Noninteractive Locally Private Learning of Linear Models via Polynomial Approximations.
Proceedings of the Algorithmic Learning Theory, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Differentially Private Empirical Risk Minimization in Non-interactive Local Model via Polynomial of Inner Product Approximation.
CoRR, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Revealing Network Structure, Confidentially: Improved Rates for Node-Private Graphon Estimation.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
J. Priv. Confidentiality, 2016
CoRR, 2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Lipschitz Extensions for Node-Private Graph Statistics and the Generalized Exponential Mechanism.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015
On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Efficient Lipschitz Extensions for High-Dimensional Graph Statistics and Node Private Degree Distributions.
CoRR, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
2014
J. Priv. Confidentiality, 2014
Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013
(Nearly) Optimal Algorithms for Private Online Learning in Full-information and Bandit Settings.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013
Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology, 2013
Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso.
Proceedings of the COLT 2013, 2013
2012
IEEE Trans. Inf. Theory, 2012
J. Priv. Confidentiality, 2012
Private Convex Optimization for Empirical Risk Minimization with Applications to High-dimensional Regression.
Proceedings of the COLT 2012, 2012
2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
2010
J. Priv. Confidentiality, 2010
J. Cryptol., 2010
Electron. Colloquium Comput. Complex., 2010
The price of privately releasing contingency tables and the spectra of random matrices with correlated rows.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010
2009
Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem.
SIAM J. Comput., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
IEEE Trans. Inf. Theory, 2008
SIAM J. Comput., 2008
CoRR, 2008
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
2006
Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Electron. Colloquium Comput. Complex., 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006
Proceedings of the Advances in Cryptology, 2006
2005
Sublinear Algorithms for Approximating String Compressibility and the Distribution Support Size
Electron. Colloquium Comput. Complex., 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Advances in Cryptology, 2004
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption.
Proceedings of the Approximation, 2004
2003
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, 2002
2001
IACR Cryptol. ePrint Arch., 2001
Proceedings of the Advances in Cryptology, 2001
1999
CoRR, 1999