共 36 条
[1]
Balu R., 2016, P 4 ACM WORKSH INF H, P57, DOI DOI 10.1145/2909827.2930793
[2]
Local, Private, Efficient Protocols for Succinct Histograms
[J].
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING,
2015,
:127-135
[3]
Berlioz A., 2015, P 9 ACM C REC SYST, P107, DOI DOI 10.1145/2792838.2800173
[4]
Brozovsky L, 2007, ARXIV
[5]
"You Might Also Like:" Privacy Risks of Collaborative Filtering
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:231-246
[6]
Chen R, 2016, PROC INT CONF DATA, P289, DOI 10.1109/ICDE.2016.7498248
[7]
Dong DP, 2015, PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, P1183, DOI 10.1109/BigData.2015.7363872
[8]
Local Privacy and Statistical Minimax Rates
[J].
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS),
2013,
:429-438
[9]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[10]
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1054-1067