共 31 条
[1]
[Anonymous], 2008, P 14 ACM SIGKDD INT, DOI DOI 10.1145/1401890.1401904
[2]
Armknecht F., 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2011), P65, DOI 10.1109/Med-Hoc-Net.2011.5970495
[3]
Arthur D, 2007, PROCEEDINGS OF THE EIGHTEENTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P1027
[7]
Chu P.-M., 2018, 2018 3 INT C CONTR A, DOI [10.2991/caai-18.2018.25, DOI 10.2991/CAAI-18.2018.25]
[8]
Differential privacy: A survey of results
[J].
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS,
2008, 4978
:1-19
[9]
Calibrating noise to sensitivity in private data analysis
[J].
THEORY OF CRYPTOGRAPHY, PROCEEDINGS,
2006, 3876
:265-284
[10]
The Algorithmic Foundations of Differential Privacy
[J].
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE,
2013, 9 (3-4)
:211-406