共 48 条
[1]
[Anonymous], 2003, ACM KDD
[2]
Privacy and Security in Internet of Things and Wearable Devices
[J].
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS,
2015, 1 (02)
:99-109
[3]
Bassily R., 2017, Proc. NeurIPS, P2288
[4]
Local, Private, Efficient Protocols for Succinct Histograms
[J].
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2015,
:127-135
[5]
Lightweight Techniques for Private Heavy Hitters
[J].
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP,
2021,
:762-776
[7]
Cambridge U.K., 2017, Probability and Computing: Random-ization and Probabilistic Techniques in Algorithms and Data Analysis
[8]
Chen R, 2011, PROC VLDB ENDOW, V4, P1087
[9]
Cormode G., 2012, ICDT 2012, P299
[10]
Dachman-Soled D, 2009, LECT NOTES COMPUT SC, V5536, P125, DOI 10.1007/978-3-642-01957-9_8