共 19 条
[1]
[Anonymous], 2018, P 6 INT C LEARN REPR
[2]
Damgard Ivan, 2009, International Journal of Applied Cryptography, V1, P323, DOI 10.1504/IJACT.2009.028031
[3]
Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
[4]
Damgard I, 2006, LECT NOTES COMPUT SC, V3876, P285
[5]
Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
[6]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406
[7]
Fischlin M, 2001, LECT NOTES COMPUT SC, V2020, P457
[8]
Heikkila M., 2017, P 31 INT C NEUR INF, V30, P3229
[9]
Kairouz P., 2015, P ADV NEUR INF PROC, P2008
[10]
Kiribuchi N., 2011, INT WORKSH INF SEC A, P187