[1] |
DALENIUS T . Towards a methodology for statistical disclosure control[J]. Statistic Tidskrift, 1977,15(2): 429-444.
|
[2] |
SWEENEY L . K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
|
[3] |
MACHNAVAJJHALA A , GEHRKE J , KIFER D ,et al. l-diversity:privacy beyond k-anonymity[C]// International Conference on Data Engineering. IEEE, 2006:24.
|
[4] |
LI N H , LI T C , VENKATASUBRAMANIAN S . t-closeness:privacy beyond k-anonymity and l-diversity[C]// IEEE International Conference on Data Engineering. IEEE, 2007: 106-115.
|
[5] |
WONG R C , LI J Y , FU A W ,et al. (α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[C]// ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2006: 754-759.
|
[6] |
DWORK C . A firm foundation for private data analysis[J]. Communications of the ACM, 2011,54(1): 86-95.
|
[7] |
DWORK C , KENTHAPADI K , MCSHERRY F ,et al. Our data,ourselves:privacy via distributed noise generation[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 2006: 486-503.
|
[8] |
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[M]. Theory of Cryptography. Springer Berlin Heidelberg, 2006: 637-648.
|
[9] |
DWORK C , NAOR M , PITASSI T ,et al. Differential privacy under continual observation[J]. Stoc, 2010: 715-724.
|
[10] |
DWORK C , NAOR M , PITASSI T ,et al. Pan-private streaming algorithms[C]// The First Symposium on Innovations in Computer Science. 2010: 66-80.
|
[11] |
NOVAC O C , NOVAC M , CORDAN O ,et al. Comparative study of Google,Android,Apple iOS and Microsoft Windows Phone mobile operating systems[C]// International Conference on Engineering of Modern Electric System. 2017: 154-159.
|
[12] |
SLVA M R D , ROMOS T M , HOLANDA M T D . Geographic information system with public participat on iOS system[C]// Information Systems and Technologies. 2017: 1-5.
|
[13] |
PIHUR V , KOROLOVA A . RAPPOR:randomized aggregatable privacy-preserving ordinal response[C]// ACM Sigsac Conference on Computer and Communications Security. ACM, 2014: 1054-1067.
|
[14] |
FANTI G , PIHUR V , ULFAR E . Building a RAPPOR with the unknown:privacy-preserving learning of associations and data dictionaries[J]. Proceedings on Privacy Enhancing Technologies, 2016,2016(3): 41-61.
|
[15] |
NGUYEN T T , XIAO X , YANG Y ,et al. Collecting and analyzing data from smart device users with local differential privacy[J]. arXiv:1606.05053.
|
[16] |
DUCHI J C , JORDAN M I , WAINWRIGHT M J . Local privacy and statistical minimax rates[C]// Annual IEEE Symposium on Foundations of Computer Science. 2013: 429-438.
|
[17] |
WARNER S L . Randomized response:a survey technique for eliminating evasive answer bias[J]. Journal of the American Statistical Association, 1965,60(309): 63-66.
|
[18] |
DWORK C , ARON R . The algorithmic foundations of differential privacy[M]. Now Publishers Inc. 2014.
|
[19] |
XU J , ZHANG Z , XIAO X ,et al. Differentially private histogram publication[C]// International Conference on Data Engineering. IEEE, 2012: 32-43.
|
[20] |
ENGEL D , EIBL G . Wavelet-based multiresolution smart meter privacy[J]. IEEE Transactions on Smart Grid, 2017,8(4): 1710-1721.
|
[21] |
HAY M , MACHANAVAJJHALA A , MIKLAU G ,et al. Principled evaluation of differentially private algorithms using DPBench[J]. arXiv:1512.04817.
|
[22] |
QIN Z , YANG Y , YU T ,et al. Heavy hitter estimation over set-valued data with local differential privacy[C]// ACM Sigsac Conference on Computer and Communications Security. ACM, 2016: 192-203.
|
[23] |
HITAJ B , ATENIESE G , PEREZ F . Deep models under the GAN:information leakage from collaborative deep learning[J]. arXiv:1702.07464.
|