暂无分享,去创建一个
[1] Johannes Gehrke,et al. Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy , 2011, TCC.
[2] Tianqing Zhu,et al. Correlated Differential Privacy: Hiding Information in Non-IID Data Set , 2015, IEEE Transactions on Information Forensics and Security.
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[5] Ashwin Machanavajjhala,et al. A rigorous and customizable framework for privacy , 2012, PODS.
[6] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[7] J. I. The Design of Experiments , 1936, Nature.
[8] Michael Carl Tschantz,et al. A Methodology for Information Flow Experiments , 2014, 2015 IEEE 28th Computer Security Foundations Symposium.
[9] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[10] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[11] Jun Tang,et al. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.
[12] Ashwin Machanavajjhala,et al. Pufferfish , 2014, ACM Trans. Database Syst..
[13] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[14] Hiroshi Nakagawa,et al. Bayesian Differential Privacy on Correlated Data , 2015, SIGMOD Conference.
[15] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[16] Graham Cormode,et al. Personal privacy vs population privacy: learning to attack anonymization , 2011, KDD.
[17] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[18] M. Kosinski,et al. Deep Neural Networks Are More Accurate Than Humans at Detecting Sexual Orientation From Facial Images , 2018, Journal of personality and social psychology.
[19] Paul W. Cuff,et al. Differential Privacy as a Mutual Information Constraint , 2016, CCS.
[20] Mário S. Alvim,et al. On the Relation between Differential Privacy and Quantitative Information Flow , 2011, ICALP.
[21] Jonathan Katz,et al. Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[22] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[23] Michael Carl Tschantz,et al. Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination , 2014, ArXiv.
[24] Ashwin Machanavajjhala,et al. No free lunch in data privacy , 2011, SIGMOD '11.
[25] Geoffrey Smith,et al. Recent Developments in Quantitative Information Flow (Invited Tutorial) , 2015, 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science.
[26] Shiva Prasad Kasiviswanathan,et al. On the 'Semantics' of Differential Privacy: A Bayesian Formulation , 2008, J. Priv. Confidentiality.
[27] Prateek Mittal,et al. Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples , 2016, NDSS.
[28] Moni Naor,et al. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy , 2010, J. Priv. Confidentiality.
[29] Arpita Ghosh,et al. Inferential Privacy Guarantees for Differentially Private Mechanisms , 2016, ITCS.
[30] Philip S. Yu,et al. Correlated network data publication via differential privacy , 2013, The VLDB Journal.
[31] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.