Organizations are increasingly interested in allowing external data scientists to explore their sensitive datasets. Due to the popularity of differential privacy, data owners want the data exploration to ensure provable privacy guarantees. However, current systems for a... View more
 M. Abadi, A. Chu, I. J. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang. Deep learning with di erential privacy. In SIGSAC, 2016.
 Z. Abedjan, J. Morcos, M. N. Gubanov, I. F. Ilyas, M. Stonebraker, P. Papotti, and M. Ouzzani. Dataxformer: Leveraging the web for semantic transformations. In CIDR, 2015.
 K. Bellare, C. Curino, A. Machanavajjhala, P. Mika, M. Rahukar, and A. Sane. Woo: A scalable and multi-tenant platform for continuous knowledge base synthesis. In Proceedings of Very Large Data Bases (PVLDB) - Industrial Track, 2013.
 S. Das, A. Doan, P. S. G. C., C. Gokhale, and P. Konda. The magellan data repository. https://sites.google.com/site/anhaidgroup/ projects/data.
 C. Dwork, F. McSherry, K. Nissim, and A. D. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, 2006.
 C. Dwork and A. Roth. The algorithmic foundations of di erential privacy. Found. Trends Theor. Comput. Sci., 2014.
 A. K. Elmagarmid, P. G. Ipeirotis, and V. S. Verykios. Duplicate record detection: A survey. IEEE Trans. Knowl. Data Eng., 2007.
 U. Erlingsson, V. Pihur, and A. Korolova. Rappor: Randomized aggregatable privacy-preserving ordinal response. In CCS, 2014.
 H. Galhardas, D. Florescu, D. E. Shasha, and E. Simon. AJAX: an extensible data cleaning tool. In SIGMOD, 2000.