Maximal α-Leakage and its Properties
暂无分享,去创建一个
[1] Sudeep Kamath,et al. An operational measure of information leakage , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[2] Sergio Verdú,et al. Upper bounds on the relative entropy and Rényi divergence as a function of total variation distance for finite alphabets , 2015, 2015 IEEE Information Theory Workshop - Fall (ITW).
[3] Ilya Mironov,et al. Rényi Differential Privacy , 2017, 2017 IEEE 30th Computer Security Foundations Symposium (CSF).
[4] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[5] Neri Merhav,et al. Universal Prediction , 1998, IEEE Trans. Inf. Theory.
[6] Oliver Kosut,et al. Robustness of Maximal α-Leakage to Side Information , 2019, 2019 IEEE International Symposium on Information Theory (ISIT).
[7] Richard D. Wesel,et al. Multiterminal source coding with an entropy-based distortion measure , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.
[8] Oliver Kosut,et al. A Tunable Measure for Information Leakage , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[9] H. Vincent Poor,et al. Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach , 2011, IEEE Transactions on Information Forensics and Security.
[10] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] R. Sibson. Information radius , 1969 .
[13] Sudeep Kamath,et al. An Operational Approach to Information Leakage , 2018, IEEE Transactions on Information Theory.
[14] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[15] Oliver Kosut,et al. Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs , 2018, IEEE Transactions on Information Theory.
[16] Muriel Médard,et al. On information-theoretic metrics for symmetric-key encryption and privacy , 2014, 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[17] Oliver Kosut,et al. Privacy Under Hard Distortion Constraints , 2018, 2018 IEEE Information Theory Workshop (ITW).
[18] Peter E. Latham,et al. Mutual Information , 2006 .
[19] G. Crooks. On Measures of Entropy and Information , 2015 .