His scientific interests lie mostly in Differential privacy, Computer security, Incentive, Privacy software and Machine learning. Ilya Mironov interconnects Equivalence, Theoretical computer science, Secret sharing and Row in the investigation of issues within Differential privacy. His Computer security research includes elements of Payment, Overhead, Peer-to-peer and Reinforcement learning.
His Incentive research includes themes of Computation and The Internet. His studies in Privacy software integrate themes in fields like Inference and Data mining. His Machine learning study integrates concerns from other disciplines, such as Information sensitivity, Private information retrieval and Artificial intelligence.
Ilya Mironov spends much of his time researching Theoretical computer science, Differential privacy, Cryptography, Computer security and Encryption. His Theoretical computer science study combines topics in areas such as Hash function, Cryptanalysis and Protocol. His study in Differential privacy is interdisciplinary in nature, drawing from both Machine learning, Recommender system, Artificial intelligence and Privacy software.
His study on Artificial neural network is often connected to Noise as part of broader study in Machine learning. The Oblivious transfer research Ilya Mironov does as part of his general Cryptography study is frequently linked to other disciplines of science, such as Impossibility, therefore creating a link between diverse domains of science. His research in Computer security focuses on subjects like Incentive, which are connected to Peer-to-peer, Payment and Reinforcement learning.
His main research concerns Differential privacy, Data mining, Artificial intelligence, Analytics and Noise. His research integrates issues of Computer security, Anonymity, Recommender system, Privacy software and Range in his study of Differential privacy. His Privacy software research is multidisciplinary, incorporating perspectives in Data modeling and Private information retrieval.
His research on Artificial intelligence often connects related areas such as Machine learning. The Machine learning study combines topics in areas such as Privacy by Design, Information privacy, Internet privacy and Training set. His work in Analytics tackles topics such as Profiling which are related to areas like Secret sharing, Cryptography and Data science.
Ilya Mironov mostly deals with Differential privacy, Artificial intelligence, Noise, Scalability and Data mining. His work deals with themes such as Computer security and Privacy software, which intersect with Differential privacy. His Computer security study incorporates themes from Overhead and Corollary.
The various areas that Ilya Mironov examines in his Privacy software study include Analytics, Secret sharing and Profiling. His Artificial intelligence research is multidisciplinary, incorporating elements of Disjoint sets, Machine learning and Personally identifiable information. His Data mining research incorporates elements of Normalization, Deep learning and Curse of dimensionality.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Deep Learning with Differential Privacy
Martin Abadi;Andy Chu;Ian Goodfellow;H. Brendan McMahan.
computer and communications security (2016)
Our data, ourselves : Privacy via distributed noise generation
Cynthia Dwork;Krishnaram Kenthapadi;Frank Mcsherry;Ilya Mironov.
Lecture Notes in Computer Science (2006)
Incentives for sharing in peer-to-peer networks
Philippe Golle;Kevin Leyton-Brown;Ilya Mironov.
electronic commerce (2001)
Incentives for Sharing in Peer-to-Peer Networks
Philippe Golle;Kevin Leyton-Brown;Ilya Mironov;Mark Lillibridge.
Lecture Notes in Computer Science (2001)
Differentially private recommender systems: Building privacy into the Netflix Prize contenders
Frank McSherry;Ilya Mironov.
knowledge discovery and data mining (2009)
Rényi Differential Privacy
ieee computer security foundations symposium (2017)
Cache-collision timing attacks against AES
Joseph Bonneau;Ilya Mironov.
cryptographic hardware and embedded systems (2006)
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE
Joppe Bos;Craig Costello;Leo Ducas;Ilya Mironov.
computer and communications security (2016)
Uncheatable Distributed Computations
Philippe Golle;Ilya Mironov.
the cryptographers track at the rsa conference (2001)
Scalable Private Learning with PATE
Nicolas Papernot;Shuang Song;Ilya Mironov;Ananth Raghunathan.
international conference on learning representations (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: