Topology-theoretic approach to address attribute linkage attacks in differential privacy
暂无分享,去创建一个
[1] Joseph P. Near,et al. Differential Privacy at Scale: Uber and Berkeley Collaboration , 2018 .
[2] Benjamin C. M. Fung,et al. Publishing set-valued data via differential privacy , 2011, Proc. VLDB Endow..
[3] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[4] David Leoni,et al. Non-interactive differential privacy: a survey , 2012, WOD.
[5] Jianliang Xu,et al. Towards Accurate Histogram Publication under Differential Privacy , 2014, SDM.
[6] Andreas Haeberlen,et al. Differential Privacy Under Fire , 2011, USENIX Security Symposium.
[7] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Yu Zhang,et al. Differentially Private High-Dimensional Data Publication via Sampling-Based Inference , 2015, KDD.
[9] Claude Castelluccia,et al. Differentially Private Histogram Publishing through Lossy Compression , 2012, 2012 IEEE 12th International Conference on Data Mining.
[10] Wei Tian,et al. A Survey of Privacy Preserving Data Publishing using Generalization and Suppression , 2014 .
[11] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[12] C. H. Dowker. HOMOLOGY GROUPS OF RELATIONS , 1952 .
[13] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[14] Chris Clifton,et al. How Much Is Enough? Choosing ε for Differential Privacy , 2011, ISC.
[15] Philip S. Yu,et al. Differentially private data release for data mining , 2011, KDD.
[16] Katrina Ligett,et al. A Simple and Practical Algorithm for Differentially Private Data Release , 2010, NIPS.
[17] Prateek Mittal,et al. Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples , 2016, NDSS.
[18] Philip S. Yu,et al. Correlated network data publication via differential privacy , 2013, The VLDB Journal.
[19] Panos Kalnis,et al. Privacy-preserving anonymization of set-valued data , 2008, Proc. VLDB Endow..
[20] Cynthia Dwork,et al. Differential Privacy , 2006, Encyclopedia of Cryptography and Security.
[21] Yan Zhang,et al. RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[22] Vitaly Shmatikov,et al. How To Break Anonymity of the Netflix Prize Dataset , 2006, ArXiv.
[23] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[24] Jeffrey F. Naughton,et al. Anonymization of Set-Valued Data via Top-Down, Local Generalization , 2009, Proc. VLDB Endow..
[25] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[26] C. Dwork,et al. Exposed! A Survey of Attacks on Private Data , 2017, Annual Review of Statistics and Its Application.
[27] Michael Erdmann. Topology of Privacy: Lattice Structures and Information Bubbles for Inference and Obfuscation , 2017, ArXiv.
[28] Ashwin Machanavajjhala,et al. A rigorous and customizable framework for privacy , 2012, PODS.
[29] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[30] Yue Wang,et al. A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy , 2014, Proc. VLDB Endow..