2020 - IEEE Richard W. Hamming Medal “For foundational work in privacy, cryptography, and distributed computing, and for leadership in developing differential privacy.”
2015 - ACM Fellow For contributions to the science of database privacy, cryptography, and distributed computing.
2014 - Member of the National Academy of Sciences
2008 - Fellow of the American Academy of Arts and Sciences
2008 - Member of the National Academy of Engineering For fundamental contributions to distributed algorithms and the security of cryptosystems.
Cynthia Dwork spends much of her time researching Differential privacy, Computer security, Data mining, Cryptography and Theoretical computer science. The concepts of her Differential privacy study are interwoven with issues in Actuarial science, Data structure and Row. Her Computer security research is multidisciplinary, incorporating perspectives in De-anonymization and Data analysis.
Her Data mining research incorporates elements of Data set, Spurious relationship, Estimator, Information privacy and Synthetic data. Her study in Cryptography is interdisciplinary in nature, drawing from both Control, Confidentiality, Official statistics and Access control. Cynthia Dwork interconnects Algorithm, Hash function, Mathematical proof and Modulo in the investigation of issues within Theoretical computer science.
Her scientific interests lie mostly in Theoretical computer science, Differential privacy, Computer security, Algorithm and Discrete mathematics. Her studies in Theoretical computer science integrate themes in fields like Gas meter prover, Mathematical proof, Cryptography, Protocol and Computation. The study incorporates disciplines such as Information privacy and Internet privacy in addition to Differential privacy.
Her Algorithm study combines topics from a wide range of disciplines, such as Function, Bounded function and Shared memory. Her Discrete mathematics research is multidisciplinary, relying on both Constant, Upper and lower bounds and Zero-knowledge proof. Her studies deal with areas such as Statistical inference and Row, Database as well as Data mining.
Her main research concerns Differential privacy, Theoretical computer science, Data mining, Machine learning and Artificial intelligence. Her Differential privacy study also includes
The various areas that she examines in her Theoretical computer science study include Computation, Protocol and Oracle. Her study on Computation also encompasses disciplines like
Her primary areas of study are Differential privacy, Artificial intelligence, Machine learning, Theoretical computer science and Data mining. Her research in Differential privacy intersects with topics in Computer security, Information privacy and Privacy software. Her work deals with themes such as Computation, Identity, Internet privacy and Relaxation, which intersect with Computer security.
Her Artificial intelligence research is multidisciplinary, incorporating elements of Statistical inference and Group. Her Theoretical computer science research includes elements of Accuracy improvement, Exponential function and Summary statistics. In her research, Data set, Common cause and special cause and Multiple comparisons problem is intimately related to Spurious relationship, which falls under the overarching field of Data mining.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Differential privacy: a survey of results
Cynthia Dwork.
theory and applications of models of computation (2008)
Differential privacy
Cynthia Dwork.
international colloquium on automata languages and programming (2006)
Calibrating noise to sensitivity in private data analysis
Cynthia Dwork;Frank Mcsherry;Kobbi Nissim;Adam Smith.
theory of cryptography conference (2006)
The Algorithmic Foundations of Differential Privacy
Cynthia Dwork;Aaron Roth.
(2014)
Rank aggregation methods for the Web
Cynthia Dwork;Ravi Kumar;Moni Naor;D. Sivakumar.
the web conference (2001)
Consensus in the presence of partial synchrony
Cynthia Dwork;Nancy Lynch;Larry Stockmeyer.
Journal of the ACM (1988)
Pricing via Processing or Combatting Junk Mail
Cynthia Dwork;Moni Naor.
international cryptology conference (1992)
Non-malleable cryptography
Danny Dolev;Cynthia Dwork;Moni Naor.
symposium on the theory of computing (1991)
Our data, ourselves: privacy via distributed noise generation
Cynthia Dwork;Krishnaram Kenthapadi;Frank Mcsherry;Ilya Mironov.
theory and application of cryptographic techniques (2006)
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
Lars Backstrom;Cynthia Dwork;Jon Kleinberg.
the web conference (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Weizmann Institute of Science
IBM (United States)
Materialize, Inc.
Stanford University
Hebrew University of Jerusalem
Apple (United States)
University of Toronto
Amazon (United States)
Boston University
Apple (United States)
Imperial College London
University of KwaZulu-Natal
The University of Texas at Austin
Michigan State University
Rutgers, The State University of New Jersey
Oklahoma Medical Research Foundation
Wageningen University & Research
University of Aberdeen
Agricultural Research Service
University of Michigan–Ann Arbor
Garvan Institute of Medical Research
University of California, Davis
Dalhousie University
University of Rennes 1
Case Western Reserve University
University of Zurich