1 code implementation • 30 May 2017 • Katrina Ligett, Seth Neel, Aaron Roth, Bo Waggoner, Z. Steven Wu
Traditional approaches to differential privacy assume a fixed privacy requirement $\epsilon$ for a computation, and attempt to maximize the accuracy of the computation subject to the privacy constraint.