[1] |
DWORK C , . Differential privacy[C]// Proceedings of the 33rd In-ternational Colloquium on Automata,Languages and Programming,Venice. 2006: 1-12.
|
[2] |
SWEENEY L . K-anonymity:a model for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge Based Systems, 2002,10(5): 557-570.
|
[3] |
NARAYANAN A , SHMATIKOV V . Robust de-anonymization of large sparse datasets[C]// Proceedings of IEEE Symposium on Security and Privacy,Oakland. 2008: 111-125.
|
[4] |
RIBEIRO B , CHEN W , MIKLAU G ,et al. Analyzing privacy in enterprise packet trace anonymization[C]// Proceedings of the Net-work and Distributed System Security Symposium,San Diego. 2008.
|
[5] |
MACHANAVAJJHALA A , KIFER D , GEHRKE J ,et al. L-diversity:privacy beyond k-anonymity[C]// Proceedings of the 22nd International Conference on Data Engineering,Washington,DC. 2006: 24-35.
|
[6] |
LI N , LI T , VENKATASUBRAMANIAN S . T-closeness:privacy beyond k-anonymity and l-diversity[C]// Proceedings of the 23rd International Conference on Data Engineering,Washington DC. 2007: 106-115.
|
[7] |
DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Proceedings of the 3rd Con-ference on Theory of Cryptography,New York. 2006: 265-284.
|
[8] |
ANDRES M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security,Berlin. 2013: 901-914.
|
[9] |
SHEN E , YU T . Mining frequent graph patterns with differential privacy[C]// Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,Chicago. 2013: 545-553.
|
[10] |
ZHAO J , JUNG T , WANG Y ,et al. Achieving differential privacy of data disclosure in the smart grid[C]// Proceedings of IEEE IN-FOCOM 2014,Toronto. 2014: 504-512.
|
[11] |
XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,Denver. 2015: 1298-1309.
|
[12] |
XU J , ZHANG Z , XIAO X ,et al. Differentially private histogram publication[C]// Proceedings of IEEE 28th International Conference on Data Engineering,Washington DC. 2012: 32-43.
|
[13] |
LI H , XIONG L , JIANG X ,et al. Differentially private histogram publication for dynamic datasets:an adaptive sampling ap-proach[C]// Proceedings of the 24th ACM International Conference on Information and Knowledge Management,Melbourne. 2015: 1001-1010.
|
[14] |
PENG S , YANG Y , ZHANG Z ,et al. DP-tree:indexing multidi-mensional data under differential privacy[C]// Proceedings of the ACM SIGMOD International Conference on Management of Data,Scottsdale. 2012: 864-864.
|
[15] |
YAROSLAVTSEV G , CORMODE G , PROCOPIUC C M ,et al. Accurate and efficient private release of datacubes and contingency tables[C]// Proceedings of 29th IEEE International Conference on Data Engineering,Brisbane. 2013: 745-756.
|
[16] |
CHEN R , REZNICHENKO A , FRANCIS P ,et al. Towards statis-tical queries over distributed private user data[C]// Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation,San Jose. 2012: 169-182.
|
[17] |
TRAMER F , HUANG Z , HUBAUX J P ,et al. Differential privacy with bounded priors:reconciling utility and privacy in ge-nome-wide association studies[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,Denver. 2015: 1286-1297.
|
[18] |
SANCHEZ D , DOMINGO-FERRER J , MARTINEZ S . Improving the utility of differential privacy via univariate microaggrega-tion[C]// Proceedings of Privacy in Statistical Databases,Ibiza. 2014: 130-142.
|
[19] |
MCSHERRY F , TARWAR K . Mechanism design via differential privacy[C]// Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science,Providence,Rhode Island. 2007: 97-103.
|