Jalaj Upadhyay
Jalaj Upadhyay
Researcher, Apple
Verified email at apple.com - Homepage
Cited by
Cited by
Is interaction necessary for distributed private learning?
A Smith, A Thakurta, J Upadhyay
2017 IEEE Symposium on Security and Privacy (SP), 58-77, 2017
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
Cryptology ePrint Archive, 2015
On the complexity of the herding attack and some related attacks on hash functions
SR Blackburn, DR Stinson, J Upadhyay
Designs, Codes and Cryptography 64 (1), 171-193, 2012
Near optimal linear algebra in the online and sliding window models
V Braverman, P Drineas, C Musco, C Musco, J Upadhyay, DP Woodruff, ...
2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS …, 2020
Random projections, graph sparsification, and differential privacy
J Upadhyay
International Conference on the Theory and Application of Cryptology and …, 2013
Randomness efficient fast-johnson-lindenstrauss transform with applications in differential privacy and compressed sensing
J Upadhyay
arXiv preprint arXiv:1410.2470, 2014
The price of privacy for low-rank factorization
J Upadhyay
Advances in Neural Information Processing Systems, 4176-4187, 2018
Differentially private linear algebra in the streaming model
J Upadhyay
arXiv preprint arXiv:1409.5414, 2014
On differentially private graph sparsification and applications
R Arora, J Upadhyay
Advances in neural information processing systems 32, 13399-13410, 2019
Fast and space-optimal low-rank factorization in the streaming model with application in differential privacy
J Upadhyay
arXiv preprint arXiv:1604.01429, 2016
Differentially private robust low-rank approximation
R Arora, V Braverman, J Upadhyay
Advances in neural information processing systems, 2018
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
MB Paterson, DR Stinson, J Upadhyay
Journal of Mathematical Cryptology 7 (3), 183-216, 2013
Multi-prover proof of retrievability
MB Paterson, DR Stinson, J Upadhyay
Journal of Mathematical Cryptology 12 (4), 203-220, 2018
Sublinear space private algorithms under the sliding window model
J Upadhyay
International Conference on Machine Learning, 6363-6372, 2019
A Framework for Private Matrix Analysis in Sliding Window Model
J Upadhyay, S Upadhyay
International Conference on Machine Learning, 10465-10475, 2021
Differentially Private Analysis on Graph Streams
J Upadhyay, S Upadhyay, R Arora
International Conference on Artificial Intelligence and Statistics, 1171-1179, 2021
On low-space differentially private low-rank factorization in the spectral norm
J Upadhyay
arXiv preprint arXiv:1611.08954, 2016
Integrity and Privacy of Large Data
J Upadhyay
University of Waterloo, 2015
Key Exchange Protocol Using Encryption Scheme Provably Secure Against CCA
JK Upadhyay
ISC Turkey, 2007
Review of: Distributed Computing Through Combinatorial Topology by Maurice Herlihy and Dmitry Kozlov and Sergio Rajsbaum.
J Upadhyay
SIGACT News 47 (2), 18-20, 2016
The system can't perform the operation now. Try again later.
Articles 1–20