共 25 条
- [1] Beimel A, 2008, LECT NOTES COMPUT SC, V5157, P451, DOI 10.1007/978-3-540-85174-5_25
- [2] Composable and Versatile Privacy via Truncated CDP [J]. STOC'18: PROCEEDINGS OF THE 50TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2018, : 74 - 86
- [3] Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 635 - 658
- [4] Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
- [5] Chen, 2020, ARXIV PREPRINT ARXIV
- [6] Dong J., 2019, ARXIV190502383
- [7] Dwork C., 2016, ARXIV PREPRINT ARXIV
- [8] Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
- [9] Calibrating noise to sensitivity in private data analysis [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 265 - 284
- [10] The Algorithmic Foundations of Differential Privacy [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406