共 36 条
[1]
Dwork C., Differential privacy, Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming- Volume Part II (ICALP), pp. 1-12, (2006)
[2]
Zhu T, Li G, Zhou W, Et al., Differentially private data publishing and analysis: A survey, IEEE Transactions on Knowledge and Data Engineering, 29, 8, pp. 1619-1638, (2017)
[3]
Zhang Xiao-Jian, Meng Xiao-Feng, Differential privacy in data publication and analysis, Chinese Journal of Computers, 37, 4, pp. 927-949, (2014)
[4]
Dwork C, Mcsherry F, Nissim K, Smith A D., Calibrating noise to sensitivity in private data analysis, Proceedings of the 3rd Theory of Cryptography Conference(TCC), pp. 265-284, (2006)
[5]
Dwork C, Roth A., The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, 9, 3-4, pp. 211-407, (2014)
[6]
Dwork C., Differential privacy: A survey of results, Proceedings of the 5th International Conference on Theory and Applications of Models of Computation(TAMC), pp. 1-19, (2008)
[7]
Kalantari K, Sankar L, Sarwate A D., Robust privacy-utility tradeoffs under differential privacy and hamming distortion, IEEE Transactions on Information Forensics and Security, 13, 11, pp. 2816-2830, (2018)
[8]
Alvim M S, Andres M E, Chatzikokolakis K, Degano P, Palamidessi C., Differential privacy: On the trade-off between utility and information leakage, Formal Aspects in Security and Trust, 7140, pp. 39-54, (2011)
[9]
Shannon C E., A mathematical theory of communication, Bell System Technical Journal, 27, 3, pp. 379-423, (1948)
[10]
Smith G., On the foundations of quantitative information flow, Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures(FoSSaCS), pp. 288-302, (2009)