How to Use Heuristics for Differential Privacy. Neel, S., Roth, A., & Wu, Z. S. CoRR, 2018. Paper bibtex @article{DBLP:journals/corr/abs-1811-07765,
author = {Seth Neel and
Aaron Roth and
Zhiwei Steven Wu},
title = {How to Use Heuristics for Differential Privacy},
journal = {CoRR},
volume = {abs/1811.07765},
year = {2018},
url = {http://arxiv.org/abs/1811.07765},
eprinttype = {arXiv},
eprint = {1811.07765},
timestamp = {Tue, 08 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1811-07765.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"nnTyLAQ4zKPyzbeFh","bibbaseid":"neel-roth-wu-howtouseheuristicsfordifferentialprivacy-2018","authorIDs":["9zbYrEFsDedtuDGmd"],"author_short":["Neel, S.","Roth, A.","Wu, Z. S."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Seth"],"propositions":[],"lastnames":["Neel"],"suffixes":[]},{"firstnames":["Aaron"],"propositions":[],"lastnames":["Roth"],"suffixes":[]},{"firstnames":["Zhiwei","Steven"],"propositions":[],"lastnames":["Wu"],"suffixes":[]}],"title":"How to Use Heuristics for Differential Privacy","journal":"CoRR","volume":"abs/1811.07765","year":"2018","url":"http://arxiv.org/abs/1811.07765","eprinttype":"arXiv","eprint":"1811.07765","timestamp":"Tue, 08 Oct 2019 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/corr/abs-1811-07765.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/corr/abs-1811-07765,\n author = {Seth Neel and\n Aaron Roth and\n Zhiwei Steven Wu},\n title = {How to Use Heuristics for Differential Privacy},\n journal = {CoRR},\n volume = {abs/1811.07765},\n year = {2018},\n url = {http://arxiv.org/abs/1811.07765},\n eprinttype = {arXiv},\n eprint = {1811.07765},\n timestamp = {Tue, 08 Oct 2019 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-1811-07765.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Neel, S.","Roth, A.","Wu, Z. S."],"key":"DBLP:journals/corr/abs-1811-07765","id":"DBLP:journals/corr/abs-1811-07765","bibbaseid":"neel-roth-wu-howtouseheuristicsfordifferentialprivacy-2018","role":"author","urls":{"Paper":"http://arxiv.org/abs/1811.07765"},"metadata":{"authorlinks":{"neel, s":"https://bibbase.org/show?bib=https://dblp.org/pid/188/6406.bib"}},"downloads":0},"bibtype":"article","biburl":"https://dblp.org/pid/188/6406.bib","creationDate":"2020-08-06T21:09:19.247Z","downloads":0,"keywords":[],"search_terms":["use","heuristics","differential","privacy","neel","roth","wu"],"title":"How to Use Heuristics for Differential Privacy","year":2018,"dataSources":["8Hk64DWEPAQXioEvT"]}