共 15 条
[1]
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[3]
[Anonymous], 2013, P ACM SIGSAC C COMP
[4]
[Anonymous], 2012, P 2012 ACM C COMP CO, DOI DOI 10.1145/2382196.2382261
[5]
Boeing G., OSMNX NEW METHODS AC, DOI [10.2139/ssrn.2865501, DOI 10.2139/SSRN.2865501]
[6]
Chatzikokolakis Konstantinos, 2013, Privacy Enhancing Technologies.13th International Symposium, PETS 2013. Proceedings: LNCS 7981, P82, DOI 10.1007/978-3-642-39077-7_5
[7]
Differential privacy: A survey of results
[J].
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS,
2008, 4978
:1-19
[8]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[9]
Koufogiannis F, 2016, IEEE DECIS CONTR P, P7586, DOI 10.1109/CDC.2016.7799441
[10]
Miller J., 2016, ARXIV160908116