暂无分享,去创建一个
[1] Milton Abramowitz,et al. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables , 1964 .
[2] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[3] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[6] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[7] G. Tardos. Optimal probabilistic fingerprint codes , 2008, JACM.
[8] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.
[9] Kunal Talwar,et al. On the geometry of differential privacy , 2009, STOC '10.
[10] L. Duembgen. Bounding Standard Gaussian Tail Probabilities , 2010, 1012.2063.
[11] Toniann Pitassi,et al. The Limits of Two-Party Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[12] Guy N. Rothblum,et al. Boosting and Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[13] Anindya De,et al. Lower Bounds in Differential Privacy , 2011, TCC.
[14] Omar Rivasplata,et al. Subgaussian random variables : An expository note , 2012 .
[15] Aaron Roth,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[16] Amos Beimel,et al. Private Learning and Sanitization: Pure vs. Approximate Differential Privacy , 2013, APPROX-RANDOM.
[17] Jonathan Ullman,et al. Answering n{2+o(1)} counting queries with differential privacy is hard , 2012, STOC '13.
[18] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[19] Peter Harremoës,et al. Rényi Divergence and Kullback-Leibler Divergence , 2012, IEEE Transactions on Information Theory.
[20] G. Crooks. On Measures of Entropy and Information , 2015 .
[21] Thomas Steinke,et al. Robust Traceability from Trace Amounts , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[22] Salil P. Vadhan,et al. The Complexity of Computing the Optimal Composition of Differential Privacy , 2015, IACR Cryptol. ePrint Arch..
[23] Kobbi Nissim,et al. Differentially Private Release and Learning of Threshold Functions , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[24] Thomas Steinke,et al. Interactive fingerprinting codes and the hardness of preventing false discovery , 2014, 2016 Information Theory and Applications Workshop (ITA).
[25] Kobbi Nissim,et al. Simultaneous Private Learning of Multiple Concepts , 2015, ITCS.
[26] Raef Bassily,et al. Algorithmic stability for adaptive data analysis , 2015, STOC.
[27] Guy N. Rothblum,et al. Concentrated Differential Privacy , 2016, ArXiv.
[28] Thomas Steinke,et al. Between Pure and Approximate Differential Privacy , 2015, J. Priv. Confidentiality.
[29] Thomas Steinke,et al. Make Up Your Mind: The Price of Online Queries in Differential Privacy , 2016, SODA.
[30] Pramod Viswanath,et al. The Composition Theorem for Differential Privacy , 2013, IEEE Transactions on Information Theory.
[31] Jonathan Ullman,et al. Fingerprinting Codes and the Price of Approximate Differential Privacy , 2018, SIAM J. Comput..