Jalaj Upadhyay
Jalaj Upadhyay
Researcher, Apple
Geverifieerd e-mailadres voor jhu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Is interaction necessary for distributed private learning?
A Smith, A Thakurta, J Upadhyay
2017 IEEE Symposium on Security and Privacy (SP), 58-77, 2017
1052017
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
43rd International Colloquium on Automata, Languages, and Programming (ICALP …, 2016
492016
On the complexity of the herding attack and some related attacks on hash functions
SR Blackburn, DR Stinson, J Upadhyay
Designs, Codes and Cryptography 64 (1), 171-193, 2012
43*2012
Random projections, graph sparsification, and differential privacy
J Upadhyay
International Conference on the Theory and Application of Cryptology and …, 2013
192013
Randomness efficient fast-johnson-lindenstrauss transform with applications in differential privacy and compressed sensing
J Upadhyay
arXiv preprint arXiv:1410.2470, 2014
182014
Differentially private linear algebra in the streaming model
J Upadhyay
arXiv preprint arXiv:1409.5414, 2014
16*2014
The price of privacy for low-rank factorization
J Upadhyay
Advances in Neural Information Processing Systems, 4176-4187, 2018
13*2018
The price of privacy for low-rank factorization
J Upadhyay
Advances in Neural Information Processing Systems, 4176-4187, 2018
13*2018
Fast and space-optimal low-rank factorization in the streaming model with application in differential privacy
J Upadhyay
arXiv preprint arXiv:1604.01429, 2016
132016
Differentially Private Graph Sparsification and Applications
R Arora, J Upadhyay
Advances in neural information processing systems, 2019
122019
Near optimal linear algebra in the online and sliding window models
V Braverman, P Drineas, C Musco, C Musco, J Upadhyay, DP Woodruff, ...
arXiv preprint arXiv:1805.03765, 2018
12*2018
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
MB Paterson, DR Stinson, J Upadhyay
Journal of Mathematical Cryptology 7 (3), 183-216, 2013
122013
Multi-prover proof of retrievability
MB Paterson, DR Stinson, J Upadhyay
Journal of Mathematical Cryptology 12 (4), 203-220, 2018
92018
Differentially private robust low-rank approximation
R Arora, V Braverman, J Upadhyay
Advances in neural information processing systems, 2018
82018
Sublinear space private algorithms under the sliding window model
J Upadhyay
International Conference on Machine Learning, 6363-6372, 2019
42019
On low-space differentially private low-rank factorization in the spectral norm
J Upadhyay
arXiv preprint arXiv:1611.08954, 2016
12016
Key Exchange Protocol Using Encryption Scheme Provably Secure Against CCA
JK Upadhyay
ISC Turkey, 2007
12007
Differentially Private Analysis on Graph Streams
J Upadhyay, S Upadhyay, R Arora
International Conference on Artificial Intelligence and Statistics, 1171-1179, 2021
2021
A Framework for Private Matrix Analysis
J Upadhyay, S Upadhyay
arXiv preprint arXiv:2009.02668, 2020
2020
Review of: Distributed Computing Through Combinatorial Topology by Maurice Herlihy and Dmitry Kozlov and Sergio Rajsbaum.
J Upadhyay
SIGACT News 47 (2), 18-20, 2016
2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20