pith. machine review for the scientific record. sign in

hub

In: Halevi, S., Rabin, T

6 Pith papers cite this work, alongside 3,930 external citations. Polarity classification is still indexing.

6 Pith papers citing it
3,930 external citations · Crossref

hub tools

years

2026 5 2021 1

representative citing papers

Privacy by Postprocessing the Discrete Laplace Mechanism

cs.CR · 2026-05-07 · unverdicted · novelty 7.0

Postprocessing the discrete Laplace mechanism yields unbiased estimators for subexponential functions and equivalent distributions to Laplace or Staircase mechanisms under the same privacy parameters.

Differentially Private Runtime Monitoring

cs.CR · 2026-05-04 · unverdicted · novelty 7.0 · 2 refs

A technique for enforcing differential privacy in temporal runtime monitoring by analyzing dependencies and injecting noise into specifications while using tree mechanisms to limit accuracy loss.

Tradeoffs in Privacy, Welfare, and Fairness for Facility Location

cs.DS · 2026-04-12 · unverdicted · novelty 7.0

Privacy and fairness cannot both be guaranteed in facility location over all datasets, but mechanisms exist that are optimal or near-optimal on welfare and fairness for natural data while preserving worst-case differential privacy.

Ethical and social risks of harm from Language Models

cs.CL · 2021-12-08 · accept · novelty 6.0

The authors provide a detailed taxonomy of 21 risks associated with language models, covering discrimination, information leaks, misinformation, malicious applications, interaction harms, and societal impacts like job loss and environmental costs.

citing papers explorer

Showing 6 of 6 citing papers.

  • Privacy by Postprocessing the Discrete Laplace Mechanism cs.CR · 2026-05-07 · unverdicted · none · ref 3

    Postprocessing the discrete Laplace mechanism yields unbiased estimators for subexponential functions and equivalent distributions to Laplace or Staircase mechanisms under the same privacy parameters.

  • Trade-off Functions for DP-SGD with Subsampling based on Random Shuffling: Tight Upper and Lower Bounds cs.LG · 2026-05-07 · conditional · none · ref 12

    Tight closed-form bounds via Berry-Esseen show DP-SGD with random shuffling achieves near-ideal privacy (trade-off close to 1-a) for σ ≥ √(3/ln M) and large M, with δ linear in epochs restricting E to O(√M) and an asymptotic O(√E) δ under E = c_M²M.

  • Differentially Private Runtime Monitoring cs.CR · 2026-05-04 · unverdicted · none · ref 21 · 2 links

    A technique for enforcing differential privacy in temporal runtime monitoring by analyzing dependencies and injecting noise into specifications while using tree mechanisms to limit accuracy loss.

  • Privatar: Scalable Privacy-preserving Multi-user VR via Secure Offloading cs.CR · 2026-04-19 · unverdicted · none · ref 13

    Privatar uses horizontal frequency partitioning and distribution-aware minimal perturbation to enable private offloading of VR avatar reconstruction, supporting 2.37x more users with modest overhead.

  • Tradeoffs in Privacy, Welfare, and Fairness for Facility Location cs.DS · 2026-04-12 · unverdicted · none · ref 5

    Privacy and fairness cannot both be guaranteed in facility location over all datasets, but mechanisms exist that are optimal or near-optimal on welfare and fairness for natural data while preserving worst-case differential privacy.

  • Ethical and social risks of harm from Language Models cs.CL · 2021-12-08 · accept · none · ref 75

    The authors provide a detailed taxonomy of 21 risks associated with language models, covering discrimination, information leaks, misinformation, malicious applications, interaction harms, and societal impacts like job loss and environmental costs.