# Publications by Year: 2013

Analyzing Graphs with Node Differential Privacy.” In Theory of Cryptography, 7785: 457-476. Springer Berlin Heidelberg. Springer Link Abstract

. 2013. “ PDFAnalyzing Graphs with Node Differential Privacy.” In Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography, 457–476. Berlin, Heidelberg: Springer-Verlag. Publisher's Version

. 2013. “ PDFAnswering n

. 2013. “ PDF_{{2+o(1)}}counting queries with differential privacy is hard.” In Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, 361-370. Palo Alto, California, USA: ACM. DOI AbstractCharacterizing the sample complexity of private learners.” In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, 97-110. Berkeley, California, USA: ACM. DOI Abstract

. 2013. “ PDFCharacterizing the Sample Complexity of Private Learners.” In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, 97–110. New York, NY, USA: ACM. Publisher's Version

. 2013. “ PDFDifferential privacy for the analyst via private equilibrium computation.” In Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, 341-350. Palo Alto, California, USA: ACM. DOI Abstract

. 2013. “ PDF . 2013. “ PDF

Dual Lower Bounds for Approximate Degree and Markov-Bernstein Inequalities.” . Automata, Languages, and Programming, 7965: 303-314. DOI Abstract

. 2013. “ PDFEstimation of exchangeable graph models by stochastic blockmodel approximation.” In Global Conference on Signal and Information Processing (GlobalSIP), 2013 IEEE, 293-296.

. 2013. “ PDF . 2013. “ PDF

Identifying Participants in the Personal Genome Project by Name.” Data Privacy Lab, IQSS, Harvard University. Project website

. 2013. “ PDFInteractive proofs of proximity: delegating computation in sublinear time.” In Proceedings of the 45th annual ACM symposium on Symposium on theory of computing, 793-802. Palo Alto, California, USA: ACM. DOI Abstract

. 2013. “ PDFMatching Known Patients to Health Records in Washington State Data.” Data Privacy Lab, IQSS, Harvard University. Project website

. 2013. “ PDFPrivate Learning and Sanitization: Pure vs. Approximate Differential Privacy.” In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 8096: 363-378. Springer Berlin Heidelberg. Publisher's Version

. 2013. “ PDF . 2013. “ PDF

. 2013. “

Survey of Publicly Available State Health Databases.” Data Privacy Lab, IQSS, Harvard University. Project website

. 2013. “ PDFTruthful mechanisms for agents that value privacy.” In Proceedings of the fourteenth ACM conference on Electronic commerce, 215-232. Philadelphia, Pennsylvania, USA: ACM. DOI Abstract

. 2013. “ PDF