[go: up one dir, main page]

Liu et al., 2022 - Google Patents

Verifying pufferfish privacy in hidden Markov models

Liu et al., 2022

View PDF
Document ID
5913665077958063415
Author
Liu D
Wang B
Zhang L
Publication year
Publication venue
International Conference on Verification, Model Checking, and Abstract Interpretation

External Links

Snippet

Pufferfish is a Bayesian privacy framework for designing and analyzing privacy mechanisms. It refines differential privacy, the current gold standard in data privacy, by allowing explicit prior knowledge in privacy analysis. In practice, privacy mechanisms often need be modified …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • G06F17/5018Computer-aided design using simulation using finite difference methods or finite element methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • G06F17/504Formal methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Hashemi et al. Graph embedding as a new approach for unknown malware detection
EP3458953B1 (en) Systems and methods for model-based analysis of software
Păsăreanu et al. A survey of new trends in symbolic execution for software testing and analysis
Wang et al. Proving differential privacy with shadow execution
Richter et al. Algorithm selection for software validation based on graph kernels
Farzan et al. Automated hypersafety verification
Albarghouthi et al. Constraint-based synthesis of datalog programs
KR101025467B1 (en) Force information flow for RISC assembly code with timing-related hidden channels and multithreading
Li et al. Bridging semantic gaps between natural languages and APIs with word embedding
Hahn et al. Constraint-based monitoring of hyperproperties
Preiner et al. Counterexample-guided model synthesis
Beyer et al. Interpolation and SAT-based model checking revisited: Adoption to software verification
Tao et al. Workflow nets with tables and their soundness
Xu et al. Vulnerability Detection of Ethereum Smart Contract Based on SolBERT-BiGRU-Attention Hybrid Neural Model.
Hong et al. Probabilistic Bisimulation for Parameterized Systems: (with Applications to Verifying Anonymous Protocols)
Franco et al. Predominant aspects on security for quantum machine learning: Literature review
Pfeffer et al. Artificial intelligence based malware analysis
Krogmeier et al. Decidable synthesis of programs with uninterpreted functions
Tran et al. Verification of recurrent neural networks with star reachability
Watanabe et al. Pareto curves for compositionally model checking string diagrams of MDPs
Liu et al. Verifying pufferfish privacy in hidden Markov models
Usman et al. A study of learning data structure invariants using off-the-shelf tools
Doveri et al. Inclusion testing of Büchi automata based on well-quasiorders
US20070226164A1 (en) Type variables and/or temporal constraints in plan recognition
Brenas et al. Ensuring correctness of model transformations while remaining decidable