Game theory based privacy preserving analysis in correlated data publication
暂无分享,去创建一个
Qiang Ni | Wan-Chun Dou | Xiaotong Wu | Wanchun Dou | Q. Ni | Xiaotong Wu
[1] Qiang Yang,et al. Differential Privacy in Telco Big Data Platform , 2015, Proc. VLDB Endow..
[2] Bing-Rong Lin,et al. Geometry of privacy and utility , 2013, 2013 IEEE Global Conference on Signal and Information Processing.
[3] Hiroshi Nakagawa,et al. Bayesian Differential Privacy on Correlated Data , 2015, SIGMOD Conference.
[4] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[5] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[6] Jean C. Walrand,et al. How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.
[7] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[8] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[9] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[10] Philip S. Yu,et al. Correlated network data publication via differential privacy , 2013, The VLDB Journal.
[11] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[12] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[13] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[14] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[15] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[16] Gerard Debreu,et al. A Social Equilibrium Existence Theorem* , 1952, Proceedings of the National Academy of Sciences.
[17] Gérard P. Cachon,et al. Game Theory in Supply Chain Analysis , 2004 .
[18] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[19] David Xiao,et al. Is privacy compatible with truthfulness? , 2013, ITCS '13.
[20] Tianqing Zhu,et al. Correlated Differential Privacy: Hiding Information in Non-IID Data Set , 2015, IEEE Transactions on Information Forensics and Security.
[21] Brigitte Maier,et al. Supermodularity And Complementarity , 2016 .
[22] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[23] Aaron Roth,et al. Privacy and mechanism design , 2013, SECO.
[24] Kobbi Nissim,et al. Privacy-aware mechanism design , 2011, EC '12.
[25] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[26] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[27] Tim Roughgarden,et al. Universally utility-maximizing privacy mechanisms , 2008, STOC '09.
[28] Aaron Roth,et al. Selling privacy at auction , 2010, EC '11.
[29] Bing-Rong Lin,et al. Information Measures in Statistical Privacy and Data Processing Applications , 2015, TKDD.
[30] Bing-Rong Lin,et al. An Axiomatic View of Statistical Privacy and Utility , 2012, J. Priv. Confidentiality.
[31] Ashwin Machanavajjhala,et al. Pufferfish , 2014, ACM Trans. Database Syst..