[1] |
DWORK C , . Differential privacy[C]// The 33rd International Conference on Automata,Languages and Programming - Volume Part II. Berlin:Springer, 2006: 1-12.
|
[2] |
HAY M , RASTOGI V , MIKLAU G ,et al. Boosting the accuracy of differentially private histograms through consistency[J]. Proceedings of the VLDB Endowment, 2010,3(1/2): 1021-1032.
|
[3] |
吴英杰, 陈鸿, 王一蕾 ,等. 面向任意区间树结构的差分隐私直方图发布算法[J]. 模式识别与人工智能, 2015,28(12): 1084-1092.
|
|
WU Y J , CHEN H , WANG Y L ,et al. A differentially private histogram publication algorithm for arbitrary range tree structure[J]. Pattern Recognition and Artificial Intelligence, 2015,28(12): 1084-1092.
|
[4] |
孙岚, 康健, 吴英杰 ,等. 异方差加噪下差分隐私流数据发布一致性优化算法[J]. 清华大学学报(自然科学版), 2019,59(3): 203-210.
|
|
SUN L , KANG J , WU Y J ,et al. Consistency optimization algorithm for differential privacy streaming data publication with non-uniform private budgets[J]. Journal of Tsinghua University (Science and Technology), 2019,59(3): 203-210.
|
[5] |
贾俊杰, 陈慧, 马慧芳 ,等. 差分隐私的查询一致性约束研究[J]. 计算机工程与科学, 2020,42(1): 71-79.
|
|
JIA J J , CHEN H , MA H F ,et al. Query consistency constraints of differential privacy[J]. Computer Engineering & Science, 2020,42(1): 71-79.
|
[6] |
LEE J , WANG Y , KIFER D . Maximum likelihood postprocessing for differential privacy under consistency constraints[C]// The 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2015: 635-644.
|
[7] |
张双越, 蔡剑平, 田丰 ,等. 差分隐私下满足一致性的轨迹流量发布方法[J]. 计算机科学与探索, 2018,12(12): 1903-1913.
|
|
ZHANG S Y , CAI J P , TIAN F ,et al. Trajectory flow releasing method with consistency constraint under differential privacy[J]. Journal of Frontiers of Computer Science and Technology, 2018,12(12): 1903-1913.
|
[8] |
CORMODE G , PROCOPIUC C , SRIVASTAVA D ,et al. Differentially private spatial decompositions[J]. arXiv Preprint,arXiv:1103.5170, 2011.
|
[9] |
DWORK C , KENTHAPADI K , MCSHERRY F ,et al. Our data,ourselves:privacy via distributed noise generation[C]// Advances in Cryptology - EUROCRYPT 2006. Berlin:Springer, 2006: 486-503.
|
[10] |
DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Theory of Cryptography Conference. Berlin:Springer, 2006: 265-284.
|
[11] |
LI C , HAY M , RASTOGI V ,et al. Optimizing linear counting queries under differential privacy[C]// The 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems of Data. New York:ACM Press, 2010: 123-134.
|
[12] |
LEE J , CLIFTON C W . Top-k frequent itemsets via differentially private FP-trees[C]// The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Pree, 2014: 931-940.
|
[13] |
CORMODE G , PROCOPIUC C , SRIVASTAVA D ,et al. Differentially private spatial decompositions[C]// 2012 IEEE 28th International Conference on Data Engineering. Piscataway:IEEE Press, 2012: 20-31.
|
[14] |
DWYER P S , RAO C R , MITRA S K . Generalized inverse of matrices and its applications[J]. Journal of the American Statistical Association, 1973,68(341): 239.
|
[15] |
GRAYBILL F A , MEYER C D , PAINTER R J . Note on the computation of the generalized inverse of a matrix[J]. SIAM Review, 1966,8(4): 522-524.
|
[16] |
PENROSE R . A generalized inverse for matrices[J]. Mathematical Proceedings of the Cambridge Philosophical Society, 1955,51(3): 406-413.
|
[17] |
TüRKMEN R , G?KBA? H . On the spectral norm of r-circulant matrices with the Pell and Pell-Lucas numbers[J]. Journal of Inequalities and Applications, 2016,2016(1): 1-7.
|
[18] |
CHEN Y , MACHANAVAJJHALA A , HAY M ,et al. PeGaSus:dataadaptive differentially private stream processing[C]// The 2017 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2017: 1375-1388.
|
[19] |
QARDAJI W , YANG W N , LI N H . Understanding hierarchical methods for differentially private histograms[J]. Proceedings of the VLDB Endowment, 2013,6(14): 1954-1965.
|