[1] |
LIANG F , YU W , AN D ,et al. A survey on big data market:pricing,trading and protection[J]. IEEE Access, 2018,6: 15132-15154.
|
[2] |
INAN A , GURSOY M E , SAYGIN Y . Sensitivity analysis for non-interactive differential privacy:bounds and efficient algorithms[J]. IEEE Transactions on Dependable & Secure Computing, 2017,(99): 1-1.
|
[3] |
LATANYA S . k-anonymity:a model for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge based Systems, 2002,10(5): 557-570.
|
[4] |
ASHWIN M , JOHANNES G , DANIEL K . ?-diversity:privacy beyond k-anonymity[C]. International Conference on Data Engineering, 2006,1(1): 24-35.
|
[5] |
LI N H , LI T C , SURESH V . T-closeness:privacy beyond k-anonymity and l-diversity[C]. IEEE International Conference on Data Engineering, 2007: 106-115.
|
[6] |
DWORK C , ROTH A . The algorithmic foundations of differential privacy[M]. Now Publishers Inc. 2014.
|
[7] |
ZHU T Q , LI G , ZHOU W ,et al. Differentially private data publishing and analysis:a survey[J]. IEEE Transactions on Knowledge& Data Engineering, 2017,29(8): 1619-1638.
|
[8] |
DWORK C . Calibrating noise to sensitivity in private data analysis[J]. Lecture Notes in Computer Science, 2012,3876(8): 265-284.
|
[9] |
熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122.
|
|
XIONG P , ZHU T Q , WANG X F . A survey on differential privacy protection and application[J]. Chinese Journal of Computers, 2014,37(1): 101-122.
|
[10] |
LI Q , LI Y , ZENG G ,et al. Differential privacy data publishing method based on cell merging[C]// IEEE International Conference on Networking,Sensing and Control. 2017: 778-782.
|
[11] |
SORUIA-COMAS J , DOMINGO-FERRER J , SANCHEZ D ,et al. Individual differential privacy:a utility-preserving formulation of differential privacy guarantees[J]. IEEE Transactions on Information Forensics & Security, 2017,12(6): 1418-1429.
|
[12] |
SMITH M , LOPEZ MAA , ZWIESSELE M ,et al. Differentially private regression with Gaussian processes[C]// International Conference on Artificial Intelligence and Statistics. 2018.
|
[13] |
HSU J , GABOARDI M , HAEBERLEN A ,et al. Differential privacy:an economic method for choosing epsilon[C]// 2014 IEEE 27th Computer Security Foundations Symposium. 2014: 398-410.
|
[14] |
LEE J , CLIFTON C . How much is enough? choosing ε for differential privacy[C]// International Conference on Information Security. 2011: 325-340.
|
[15] |
何贤芒, 王晓阳, 陈华辉 . 差分隐私保护参数 ε 的选取研究[J]. 通信学报, 2015,36(12): 124-130.
|
|
HE X M , WANG X Y , CHEN H H . Study on choosing the parameter ε in differential privacy[J]. Journal on Communications, 2015,36(12): 124-130.
|
[16] |
郝晨艳, 彭长根, 张盼盼 . 重复攻击下差分隐私保护参数ε的选取方法[J]. 计算机工程, 2018,44(7): 151-155.
|
|
HAO Y C , PENG C G , ZHANG P P . Selection method of differential privacy protection parameter ε under repeated attack[J]. Computer Engineering, 2018,44(7): 151-155.
|
[17] |
DWORK C . Differential privacy[J]. Encyclopedia of Cryptography and Security, 2011: 338-340.
|
[18] |
DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2014,9(3-4): 211-407.
|
[19] |
BONOMI L , XIONG L . A two-phase algorithm for mining sequential patterns with differential privacy[C]// The 22nd ACM International Conference on Information & Knowledge Management. 2013: 269-278.
|