Web: http://arxiv.org/abs/2211.12063

Nov. 23, 2022, 2:20 a.m. | Edith Cohen, Xin Lyu, Jelani Nelson, Tamás Sarlós, Uri Stemmer

cs.CR updates on arXiv.org arxiv.org

Composition theorems are general and powerful tools that facilitate privacy
accounting across multiple data accesses from per-access privacy bounds.
However they often result in weaker bounds compared with end-to-end analysis.
Two popular tools that mitigate that are the exponential mechanism (or report
noisy max) and the sparse vector technique, generalized in a recent private
selection framework by Liu and Talwar (STOC 2019). In this work, we propose a
flexible framework of private selection and testing that generalizes the one
proposed …


More from arxiv.org / cs.CR updates on arXiv.org

Senior Cloud Security Engineer

@ HelloFresh | Berlin, Germany

Senior Security Engineer

@ Reverb | Remote, US

Sr. Product Manager - Cloud Security/CNAPP

@ Zscaler | Atlanta, GA, United States

ISSO - Security Delivery

@ Novetta | Columbia, MD

Junior Cyber Security Recruitment Consultant (possibility for work abroad)

@ Gradfuel | London, England, United Kingdom

Internship, Cybersecurity

@ Qontigo | Eschborn, Hessen, Germany

Security Administrator

@ Zero Hash | Melbourne, VIC - Remote

Cybersecurity Project Manager, Reactive Lead - Unit 42 Consulting (Remote)

@ Palo Alto Networks | Santa Clara, CA, United States

Consultant, GRC, Proactive Services (Unit 42) - Remote

@ Palo Alto Networks | New York City, United States

Senior Manager, Security Operations (Secure Access Engineering)

@ GitHub | Remote - United States

Junior Penetration Tester - Amsterdam

@ BreachLock | Amsterdam, North Holland, Netherlands

Senior Product Security Engineer

@ 8x8, Inc. | Remote, Romania