共 39 条
[3]
Chen J., 2017, IEEE Trans. Big Data, V7, P784, DOI DOI 10.1109/TBDATA.2017.2777862
[6]
Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy
[J].
2021 18TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON),
2021,
[7]
Dua D., 2017, UCI MACHINE LEARNING
[8]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[9]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[10]
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:1322-1333