共 22 条
[1]
Dwork C., 2010, J. Priv. Confid, V1, DOI DOI 10.29012/JPC.V1I2.570
[2]
Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
[3]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[4]
Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection
[J].
2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW),
2013,
:833-840
[5]
Fast smallest-enclosing-ball computation in high dimensions
[J].
ALGORITHMS - ESA 2003, PROCEEDINGS,
2003, 2832
:630-641
[6]
Flexible and Adaptive Subspace Search for Outlier Analysis
[J].
PROCEEDINGS OF THE 22ND ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM'13),
2013,
:1381-1390
[7]
HiCS: High Contrast Subspaces for Density-Based Outlier Ranking
[J].
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE),
2012,
:1037-1048
[8]
Knorr E. M., 1998, Proceedings of the Twenty-Fourth International Conference on Very-Large Databases, P392
[9]
Knorr EM, 1999, PROCEEDINGS OF THE TWENTY-FIFTH INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, P211
[10]
Kutz M., JAVA LIB COMPUTE MIN