Ashwin Machanavajjhala

Orcid: 0000-0003-1555-7330

Affiliations:
  • Duke University, Durham, USA


According to our database1, Ashwin Machanavajjhala authored at least 132 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privately Answering Queries on Skewed Data via Per-Record Differential Privacy.
Proc. VLDB Endow., July, 2024

Slowly Scaling Per-Record Differential Privacy.
CoRR, 2024

2023
Optimizing Error of High-Dimensional Statistical Queries Under Differential Privacy.
J. Priv. Confidentiality, August, 2023

R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys.
SIGMOD Rec., 2023

Longshot: Indexing Growing Databases using MPC and Differential Privacy.
Proc. VLDB Endow., 2023

Explaining Differentially Private Query Results With DPXPlain.
Proc. VLDB Endow., 2023

PreFair: Privately Generating Justifiably Fair Synthetic Data.
Proc. VLDB Endow., 2023

DP-PQD: Privately Detecting Per-Query Gaps In Synthetic Data Generated By Black-Box Mechanisms.
Proc. VLDB Endow., 2023

Private Proof-of-Stake Blockchains using Differentially-private Stake Distortion.
IACR Cryptol. ePrint Arch., 2023

Publishing Wikipedia usage data with strong privacy guarantees.
CoRR, 2023

2022
DPXPlain: Privately Explaining Aggregate Query Answers.
Proc. VLDB Endow., 2022

Multi-Analyst Differential Privacy for Online Query Answering.
Proc. VLDB Endow., 2022

Tumult Analytics: a robust, easy-to-use, scalable, and expressive framework for differential privacy.
CoRR, 2022

Bayesian and Frequentist Semantics for Common Variations of Differential Privacy: Applications to the 2020 Census.
CoRR, 2022

The 2020 Census Disclosure Avoidance System TopDown Algorithm.
CoRR, 2022

IncShrink: Architecting Efficient Outsourced Databases using Incremental MPC and Differential Privacy.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

2021
Budget Sharing for Multi-Analyst Differential Privacy.
Proc. VLDB Endow., 2021

Equity and Privacy: More Than Just a Tradeoff.
IEEE Secur. Priv., 2021

Benchmarking Differentially Private Synthetic Data Generation Algorithms.
CoRR, 2021

Differentially Private Algorithms for 2020 Census Detailed DHC Race \& Ethnicity.
CoRR, 2021

HDMM: Optimizing error of high-dimensional statistical queries under differential privacy.
CoRR, 2021

Prior-Aware Distribution Estimation for Differential Privacy.
CoRR, 2021

DP-cryptography: marrying differential privacy and cryptography in emerging applications.
Commun. ACM, 2021

DP-Sync: Hiding Update Patterns in Secure Outsourced Databases with Differential Privacy.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Synthesizing Linked Data Under Cardinality and Integrity Constraints.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Practical Security and Privacy for Database Systems.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
ϵKTELO: A Framework for Defining Differentially Private Computations.
ACM Trans. Database Syst., 2020

Computing Local Sensitivities of Counting Queries with Joins.
Proceedings of the 2020 International Conference on Management of Data, 2020

Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers.
Proceedings of the 2020 International Conference on Management of Data, 2020

Poirot: private contact summary aggregation: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

One-sided Differential Privacy.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Fair decision making using privacy-protected data.
Proceedings of the FAT* '20: Conference on Fairness, 2020

2019
#8712;: A Framework for Defining Differentially-Private Computations.
SIGMOD Rec., 2019

PrivateSQL: A Differentially Private SQL Query Engine.
Proc. VLDB Endow., 2019

PSynDB: Accurate and Accessible Private Data Generation.
Proc. VLDB Endow., 2019

Olympus: Sensor Privacy through Utility Aware Obfuscation.
Proc. Priv. Enhancing Technol., 2019

Releasing Earnings Distributions using Differential Privacy - Disclosure Avoidance System For Post-Secondary Employment Outcomes (PSEO).
J. Priv. Confidentiality, 2019

Answering Summation Queries for Numerical Attributes under Differential Privacy.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

Privacy Changes Everything.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

APEx: Accuracy-Aware Differentially Private Data Exploration.
Proceedings of the 2019 International Conference on Management of Data, 2019

Capacity Bounded Differential Privacy.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Permissions Plugins as Android Apps.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

PrivStream: Differentially Private Event Detection on Data Streams.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Architecting a Differentially Private SQL Engine.
Proceedings of the 9th Biennial Conference on Innovative Data Systems Research, 2019

2018
Analyzing Your Location Data with Provable Privacy Guarantees.
Proceedings of the Handbook of Mobile Data Privacy., 2018

Randomization Methods to Ensure Data Privacy.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Differentially Private Hierarchical Count-of-Counts Histograms.
Proc. VLDB Endow., 2018

ShrinkWrap: Efficient SQL Query Processing in Differentially Private Data Federations.
Proc. VLDB Endow., 2018

Is my model any good: differentially private regression diagnostics.
Knowl. Inf. Syst., 2018

Shrinkwrap: Differentially-Private Query Processing in Private Data Federations.
CoRR, 2018

Differentially Private Hierarchical Group Size Estimation.
CoRR, 2018

EKTELO: A Framework for Defining Differentially-Private Computations.
Proceedings of the 2018 International Conference on Management of Data, 2018

IoT-Detective: Analyzing IoT Data Under Differential Privacy.
Proceedings of the 2018 International Conference on Management of Data, 2018

2017
Private Exploration Primitives for Data Cleaning.
CoRR, 2017

Scaling Private Record Linkage using Output Constrained Differential Privacy.
CoRR, 2017

Privacy-Preserving Data Analysis for the Federal Statistical Agencies.
CoRR, 2017

Directed Edge Recommender System.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

Pythia: Data Dependent Differentially Private Algorithm Selection.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

DIAS: Differentially Private Interactive Algorithm Selection using Pythia.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Utility Cost of Formal Privacy for Releasing National Employer-Employee Statistics.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

ePrivateeye: to the edge and beyond!
Proceedings of the Second ACM/IEEE Symposium on Edge Computing, San Jose / Silicon Valley, 2017

Protecting Visual Secrets Using Adversarial Nets.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

PeGaSus: Data-Adaptive Differentially Private Stream Processing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Differential Privacy in the Wild: A tutorial on current practices & open challenges.
Proc. VLDB Endow., 2016

A Demonstration of VisDPT: Visual Exploration of Differentially Private Trajectories.
Proc. VLDB Endow., 2016

Exploring Privacy-Accuracy Tradeoffs using DPComp.
Proceedings of the 2016 International Conference on Management of Data, 2016

Principled Evaluation of Differentially Private Algorithms using DPBench.
Proceedings of the 2016 International Conference on Management of Data, 2016

Demo: What You Mark is What Apps See.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

What You Mark is What Apps See.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Ayumu: Efficient lifelogging with focused tasks.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Differentially Private Regression Diagnostics.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

2015
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems.
Proc. VLDB Endow., 2015

Design of Policy-Aware Differentially Private Algorithms.
Proc. VLDB Endow., 2015

On the Privacy Properties of Variants on the Sparse Vector Technique.
CoRR, 2015

Designing statistical privacy for your data.
Commun. ACM, 2015

2014
Pufferfish: A framework for mathematical privacy definitions.
ACM Trans. Database Syst., 2014

Privacy preserving interactive record linkage (PPIRL).
J. Am. Medical Informatics Assoc., 2014

Differentially Private Algorithms for Empirical Machine Learning.
CoRR, 2014

Answering Query Workloads with Optimal Error under Blowfish Privacy.
CoRR, 2014

Social Genome: Putting Big Data to Work for Population Informatics.
Computer, 2014

Blowfish privacy: tuning privacy-utility trade-offs using policies.
Proceedings of the International Conference on Management of Data, 2014

MarkIt: privacy markers for protecting visual secrets.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

2013
A SPARSI: Partitioning Sensitive Data amongst Multiple Adversaries.
Proc. VLDB Endow., 2013

WOO: A Scalable and Multi-tenant Platform for Continuous Knowledge Base Synthesis.
Proc. VLDB Endow., 2013

On Sharing Private Data with Multiple Non-Colluding Adversaries
CoRR, 2013

Network sampling.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Entity resolution for big data.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

Finding connected components in map-reduce in logarithmic rounds.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

curso: protect yourself from curse of attribute inference: a social network privacy-analyzer.
Proceedings of the 3rd ACM SIGMOD Workshop on Databases and Social Networks, 2013

Scalable Social Coordination with Group Constraints using Enmeshed Queries.
Proceedings of the Sixth Biennial Conference on Innovative Data Systems Research, 2013

2012
Publishing Search Logs - A Comparative Study of Privacy Guarantees.
IEEE Trans. Knowl. Data Eng., 2012

Entity Resolution: Theory, Practice & Open Challenges.
Proc. VLDB Endow., 2012

An Analysis of Structured Data on the Web.
Proc. VLDB Endow., 2012

Big privacy: protecting confidentiality in big data.
XRDS, 2012

Scalable Social Coordination using Enmeshed Queries
CoRR, 2012

Information integration over time in unreliable and uncertain environments.
Proceedings of the 21st World Wide Web Conference 2012, 2012

A rigorous and customizable framework for privacy.
Proceedings of the 31st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2012

An automatic blocking mechanism for large-scale de-duplication tasks.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Challenges in enabling social application at scale: cloudDB'12 invited-keynote talk abstract.
Proceedings of the Fourth International Workshop on Cloud Data Management, 2012

2011
E-Privacy.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Load Balancing and Range Queries in P2P Systems Using P-Ring.
ACM Trans. Internet Techn., 2011

Personalized Social Recommendations - Accurate or Private?
Proc. VLDB Endow., 2011

CBLOCK: An Automatic Blocking Mechanism for Large-Scale De-duplication Tasks
CoRR, 2011

Highly efficient algorithms for structural clustering of large websites.
Proceedings of the 20th International Conference on World Wide Web, 2011

Collective extraction from heterogeneous web lists.
Proceedings of the Forth International Conference on Web Search and Web Data Mining, 2011

No free lunch in data privacy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Sampling hidden objects using nearest-neighbor oracles.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Feed following: the big data challenge in social applications.
Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, 2011

2010
On the (Im)possibility of Preserving Utility and Privacy in Personalized Social Recommendations.
CoRR, 2010

Privacy in data publishing.
Proceedings of the 26th International Conference on Data Engineering, 2010

2009
Randomization Methods to Ensure Data Privacy.
Proceedings of the Encyclopedia of Database Systems, 2009

Data Publishing against Realistic Adversaries.
Proc. VLDB Endow., 2009

Privacy-Preserving Data Publishing.
Found. Trends Databases, 2009

Privacy in Search Logs
CoRR, 2009

2008
Defining and Enforcing Privacy in Data Sharing.
PhD thesis, 2008

Scalable ranked publish/subscribe.
Proc. VLDB Endow., 2008

Privacy: Theory meets Practice on the Map.
Proceedings of the 24th International Conference on Data Engineering, 2008

2007
<i>L</i>-diversity: Privacy beyond <i>k</i>-anonymity.
ACM Trans. Knowl. Discov. Data, 2007

P-ring: an efficient and robust P2P range index structure.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

Worst-Case Background Knowledge for Privacy-Preserving Data Publishing.
Proceedings of the 23rd International Conference on Data Engineering, 2007

2006
On the efficiency of checking perfect privacy.
Proceedings of the Twenty-Fifth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2006

Trusted CVS.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

l-Diversity: Privacy Beyond k-Anonymity.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2004
A storage and indexing framework for p2p systems.
Proceedings of the 13th international conference on World Wide Web, 2004

An Indexing Framework for Peer-to-Peer Systems.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004

2002
On perfectly secure cmmunication over arbitrary networks.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002

Theory of Equal-Flows in Networks.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

Asynchronous Secure Communication Tolerating Mixed Adversaries.
Proceedings of the Advances in Cryptology, 2002

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
A security assurance framework for component based software development.
Informatica (Slovenia), 2001


  Loading...