[1] |
DWORK C . Differential privacy[M]. Springer Berlin Heidelberg. 2006: 1-12.
|
[2] |
CAO L , OU Y , YU P S . Coupled behavior analysis with applications[J]. IEEE Transactions on Knowledge & Data Engineering, 2012,24(8): 1378-1392.
|
[3] |
YANG B , SATO I , NAKAGAWA H . Bayesian differential privacy on correlated data[C]// SIGMOD/PODS. 2015: 747-762.
|
[4] |
ZHU T , XIONG P , LI G ,et al. Correlated differential privacy:hiding information in non-IID data set[J]. IEEE Transactions on Information Forensics & Security, 2015,10(2): 229-242.
|
[5] |
RASTOGI V , NATH S . Differentially private aggregation of distributed time-series with transformation and encryption[C]// ACM SIGMOD International Conference on Management of Data. 2010: 735-746.
|
[6] |
XIAO X , WANG G , GEHRKE J . Differential privacy via wavelet transforms[J]. IEEE Transactions on Knowledge & Data Engineering, 2010,23(8): 1200-1214.
|
[7] |
XIAO X . Differentially private data release:improving utility with wavelets and bayesian networks[M]. Web Technologies and Applications, 2014: 25-35.
|
[8] |
JIANG W , XIE C , ZHANG Z . Wishart mechanism for differentially private principal components analysis[J]. Computer Science, 2015,9285: 458-473.
|
[9] |
DWORK C . A firm foundation for private data analysis[J]. Communications of the ACM, 2011,54(1): 86-95.
|
[10] |
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[C]// Conference on Theory of Cryptography. 2006: 265-284
|
[11] |
ZHENG Y , XIE X , MA W Y . GeoLife:a collaborative social networking service among user,location and trajectory[J]. Bulletin of the Technical Committee on Data Engineering, 2010,33(2): 32-39.
|
[12] |
HAY M , RASTOGI V , MIKLAU G ,et al. Boosting the accuracy of differentially private histograms through consistency[J]. The VLDB Endowment, 2010,3(1): 66-69.
|
[13] |
DWORK C . Differential privacy:a survey of results[M]. Theory and Applications of Models of Computation. Springer Berlin Heidelberg, 2008: 1-19.
|