共 18 条
[1]
Blum Avrim., 2008, STOC
[2]
Bradley Colleen A, 2005, MMWR Suppl, V54, P11
[3]
C. for Disease Control and Surveillance, 2007, EARL AB REP SYST
[4]
Statistical traffic modeling for network intrusion detection
[J].
8TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS,
2000,
:466-473
[5]
Chan THH, 2010, LECT NOTES COMPUT SC, V6199, P405, DOI 10.1007/978-3-642-14162-1_34
[6]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[7]
Dwork C, 2010, ACM S THEORY COMPUT, P715
[8]
Fan Liyue, 2012, CIKM, P2169, DOI DOI 10.1145/2396761.2398595
[9]
Fan Liyue., 2013, IEEE Transactions on Knowledge and Data Engineering, V99, P1