Privately Learning High-Dimensional Distributions

Published on ● Video Link: https://www.youtube.com/watch?v=2oLWHRNF_tM



Duration: 36:05
992 views
16


Gautam Kamath (Massachusetts Institute of Technology)
https://simons.berkeley.edu/talks/tba-63
Data Privacy: From Foundations to Applications




Other Videos By Simons Institute for the Theory of Computing


2019-03-18Computation of the Multivariate Independence Polynomial by Correlation Decay
2019-03-15Mechanism Design: Sample Complexity and Loss Functions
2019-03-15(Part 2) Operationally Motivating IT Leakage Measures – A Path to Maximal Leakage (Part 2)
2019-03-15Information Bottleneck and Privacy Funnel: IT Lens on Privacy-Utility Tradeoff (PUT) Problems
2019-03-14Generative Adversarial Models for Privacy and Fairness
2019-03-14Fairness: IT Approaches
2019-03-14Unifying IT Leakage Measures via the Lens of Adversarial Learning
2019-03-14(Part 1) Operationally Motivating IT Leakage Measures – A Path to Maximal Leakage
2019-03-11The Predictive Brain: Michael Pollan, Celeste Kidd, Christos Papadimitriou, and Bruno Olshausen
2019-03-08Open DP: A Proposal for an Open-Source Suite of Differential Privacy Tools
2019-03-08Privately Learning High-Dimensional Distributions
2019-03-08Relational Symbolic Execution for Differential Privacy
2019-03-08Towards Privacy-Respectful Cyber-Physical Systems: Two Perspectives
2019-03-08What We’re Doing in Australia – An API for Confidentialized Contingency Tables
2019-03-08Making Privacy Technology Accessible: Benchmarks and Platforms
2019-03-07PANEL: Where Are Statistical Agencies Going?
2019-03-07DARPA and Privacy Research
2019-03-07Some Applications of Contextual Integrity
2019-03-07Matching Uses and Data Protections for Government Data
2019-03-07Statistical Disclosure Limitation: Where do we go from here?
2019-03-07Deploying DP: Experiences from the Front Lines and Open Challenges



Tags:
Simons Institute
Theory of Computing
Theory of Computation
Theoretical Computer Science
Computer Science
UC Berkeley
Data Privacy: From Foundations to Applications
Gautam Kamath