Differential privacy, Theoretical computer science, Algorithm, Discrete mathematics and Cryptography are his primary areas of study. His Differential privacy research incorporates elements of Function, Information sensitivity, Information privacy and Row. His Theoretical computer science study combines topics from a wide range of disciplines, such as Quantum cryptography, Quantum information, Quantum computer, Secure multi-party computation and Key.
His research integrates issues of Maximum flow problem, 1-planar graph, Complement graph and Degree in his study of Algorithm. The Discrete mathematics study combines topics in areas such as Matrix, Upper and lower bounds, Table and Sequence. His Cryptography research incorporates themes from Hamming distance, Fuzzy logic and Biometrics.
Adam Smith focuses on Theoretical computer science, Discrete mathematics, Differential privacy, Adam smith and Cryptography. He works mostly in the field of Theoretical computer science, limiting it down to topics relating to Fuzzy logic and, in certain cases, Biometrics. His Discrete mathematics study combines topics in areas such as Combinatorics, Hash function, Bounded function, Function and Upper and lower bounds.
Differential privacy is a subfield of Data mining that he explores. Adam Smith integrates Adam smith and Classics in his studies. His Cryptography research is multidisciplinary, incorporating elements of Quantum, Computation and Authentication.
His primary areas of investigation include Differential privacy, Theoretical computer science, Ecology, Algorithm and Polynomial. His Differential privacy research is under the purview of Data mining. His biological study spans a wide range of topics, including Graph, Space, Fuzzy logic, Entropy and Generalization.
Adam Smith interconnects Range and Statistics in the investigation of issues within Ecology. Adam Smith works mostly in the field of Algorithm, limiting it down to topics relating to Confidence interval and, in certain cases, Python, Orders of magnitude and Sample, as a part of the same area of interest. His Cryptography research is multidisciplinary, relying on both Scalability and Shuffling.
His main research concerns Differential privacy, Theoretical computer science, Ecology, Biodiversity and Adam smith. Adam Smith has researched Differential privacy in several fields, including Statistical hypothesis testing, Computer security, Information sensitivity, Cryptography and Statistical inference. His work deals with themes such as Data mining, Information Criteria, Model selection, Consistency and Constraint, which intersect with Statistical inference.
His Theoretical computer science research integrates issues from Graph, Dependency graph, Stochastic optimization and Graph. His Ecology research includes elements of Range and Statistics. The various areas that Adam Smith examines in his Biodiversity study include Agroforestry, Endangered species, Occupancy, Spatial ecology and Data set.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Calibrating noise to sensitivity in private data analysis
Cynthia Dwork;Frank Mcsherry;Kobbi Nissim;Adam Smith.
Lecture Notes in Computer Science (2006)
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
Yevgeniy Dodis;Leonid Reyzin;Adam D. Smith.
theory and application of cryptographic techniques (2004)
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis;Rafail Ostrovsky;Leonid Reyzin;Adam Smith.
SIAM Journal on Computing (2008)
Smooth sensitivity and sampling in private data analysis
Kobbi Nissim;Sofya Raskhodnikova;Adam Smith.
symposium on the theory of computing (2007)
Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds
Raef Bassily;Adam Smith;Abhradeep Thakurta.
foundations of computer science (2014)
What Can We Learn Privately
Shiva Prasad Kasiviswanathan;Homin K. Lee;Kobbi Nissim;Sofya Raskhodnikova.
SIAM Journal on Computing (2011)
Composition attacks and auxiliary information in data privacy
Srivatsava Ranjit Ganta;Shiva Prasad Kasiviswanathan;Adam Smith.
knowledge discovery and data mining (2008)
Toward privacy in public databases
Shuchi Chawla;Cynthia Dwork;Frank McSherry;Adam Smith.
theory of cryptography conference (2005)
Authentication of Quantum Messages.
Howard Barnum;Claude Crépeau;Daniel Gottesman;Adam D. Smith.
IACR Cryptology ePrint Archive (2002)
Local, Private, Efficient Protocols for Succinct Histograms
Raef Bassily;Adam Smith.
symposium on the theory of computing (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: