共 48 条
[21]
Goldman E., 2019, Santa Clara Univ. Legal Stud. Res. Paper
[22]
Greenberg A., 2016, Wired
[23]
He Y., 2009, PVLDB, P934, DOI DOI 10.14778/1687627.1687733
[24]
Quid-Pro-Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution
[J].
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2012,
:272-284
[25]
Kairouz P, 2016, PR MACH LEARN RES, V48
[27]
PrivBasis: Frequent Itemset Mining with Differential Privacy
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2012, 5 (11)
:1340-1351
[28]
Lin J. Niu, 2021, IEEE Trans. Mobile Comput., V20, P3
[29]
Lindell Y, 2005, Encyclopedia of Data Warehousing and Mining, P1005
[30]
Machanavajjhala A., 2006, P 22 INT C DAT ENG, P24, DOI DOI 10.1186/1471-2288-10-70