共 33 条
- [11] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [12] Dwork C, 2010, ACM S THEORY COMPUT, P715
- [13] Fan L., 2013, SIGMOD '13, P1065, DOI DOI 10.1145/1749603.1749605
- [15] Graves A, 2012, STUD COMPUT INTELL, V385, P1, DOI [10.1007/978-3-642-24797-2, 10.1162/neco.1997.9.1.1]
- [16] Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies [J]. SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 1447 - 1458
- [17] Differentially Private Event Sequences over Infinite Streams [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2014, 7 (12): : 1155 - 1166
- [18] Kong DJ, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P2341
- [19] Li Haoran, 2015, Proc ACM Int Conf Inf Knowl Manag, V2015, P1001
- [20] Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples [J]. 23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016), 2016,