Completed
What differential privacy is not?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Foundations and Applications of Data Privacy - A Perspective
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Considerations in preparing this talk
- 3 Layout
- 4 Informational Privacy: The Problem
- 5 When is informational privacy preserved?
- 6 Reconstruction attacks [Dinur N '03]
- 7 Reconstruction attacks Dinur N '03
- 8 Attacks on traditional privacy enhancing techniques
- 9 Reasons for optimism
- 10 Reconstruction attacks are useful!
- 11 What reconstruction attacks teach us?
- 12 Progressing towards a definition
- 13 A privacy desiderata
- 14 A more realistic privacy desiderata
- 15 Differential privacy [Dwork McSherry N Smith 86]
- 16 New privacy concepts
- 17 What makes a good privacy concept? (2)
- 18 What makes a good privacy concept? (3)
- 19 What makes a good privacy concept? (4)
- 20 Differentially Private Computations
- 21 What can be computed with differential Privacy?
- 22 What differential privacy is not?
- 23 U.S. Census Bureau
- 24 GOOGLE
- 25 Apple
- 26 Some challenges
- 27 A perspective talk
- 28 Data Privacy: The Problem
- 29 A computer scientist and a legal scholar meet at the Simons Institute
- 30 What does "protecting individual privacy" mean?
- 31 Legal approach