Liu et al., 2022 - Google Patents
Verifying pufferfish privacy in hidden Markov modelsLiu et al., 2022
View PDF- Document ID
- 5913665077958063415
- Author
- Liu D
- Wang B
- Zhang L
- Publication year
- Publication venue
- International Conference on Verification, Model Checking, and Abstract Interpretation
External Links
Snippet
Pufferfish is a Bayesian privacy framework for designing and analyzing privacy mechanisms. It refines differential privacy, the current gold standard in data privacy, by allowing explicit prior knowledge in privacy analysis. In practice, privacy mechanisms often need be modified …
- 241001441724 Tetraodontidae 0 title abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/5018—Computer-aided design using simulation using finite difference methods or finite element methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
- G06F17/504—Formal methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hashemi et al. | Graph embedding as a new approach for unknown malware detection | |
| EP3458953B1 (en) | Systems and methods for model-based analysis of software | |
| Păsăreanu et al. | A survey of new trends in symbolic execution for software testing and analysis | |
| Wang et al. | Proving differential privacy with shadow execution | |
| Richter et al. | Algorithm selection for software validation based on graph kernels | |
| Farzan et al. | Automated hypersafety verification | |
| Albarghouthi et al. | Constraint-based synthesis of datalog programs | |
| KR101025467B1 (en) | Force information flow for RISC assembly code with timing-related hidden channels and multithreading | |
| Li et al. | Bridging semantic gaps between natural languages and APIs with word embedding | |
| Hahn et al. | Constraint-based monitoring of hyperproperties | |
| Preiner et al. | Counterexample-guided model synthesis | |
| Beyer et al. | Interpolation and SAT-based model checking revisited: Adoption to software verification | |
| Tao et al. | Workflow nets with tables and their soundness | |
| Xu et al. | Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model. | |
| Hong et al. | Probabilistic Bisimulation for Parameterized Systems: (with Applications to Verifying Anonymous Protocols) | |
| Franco et al. | Predominant aspects on security for quantum machine learning: Literature review | |
| Pfeffer et al. | Artificial intelligence based malware analysis | |
| Krogmeier et al. | Decidable synthesis of programs with uninterpreted functions | |
| Tran et al. | Verification of recurrent neural networks with star reachability | |
| Watanabe et al. | Pareto curves for compositionally model checking string diagrams of MDPs | |
| Liu et al. | Verifying pufferfish privacy in hidden Markov models | |
| Usman et al. | A study of learning data structure invariants using off-the-shelf tools | |
| Doveri et al. | Inclusion testing of Büchi automata based on well-quasiorders | |
| US20070226164A1 (en) | Type variables and/or temporal constraints in plan recognition | |
| Brenas et al. | Ensuring correctness of model transformations while remaining decidable |