暂无分享,去创建一个
Wenqi Wei | Mehmet Emre Gursoy | Ling Liu | Acar Tamersoy | Stacey Truex | Ling Liu | Stacey Truex | Wenqi Wei | Acar Tamersoy | M. E. Gursoy
[1] Yin Yang,et al. PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy , 2018, 2018 IEEE 34th International Conference on Data Engineering (ICDE).
[2] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[3] Adam D. Smith,et al. Is Interaction Necessary for Distributed Private Learning? , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[4] Yin Yang,et al. Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy , 2016, CCS.
[5] Ninghui Li,et al. Locally Differentially Private Frequent Itemset Mining , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[6] Hongxia Jin,et al. Private spatial data aggregation in the local setting , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[7] Nikos Karampatziakis,et al. Using File Relationships in Malware Classification , 2012, DIMVA.
[8] Janardhan Kulkarni,et al. Collecting Telemetry Data Privately , 2017, NIPS.
[9] Danfeng Zhang,et al. Detecting Violations of Differential Privacy , 2018, CCS.
[10] J. Domingo-Ferrer,et al. Appendix ( Data use-oriented evaluation ) to article “ Enhancing Data Utility in Differential Privacy via Microaggregation-based k-Anonymity ” , 2014 .
[11] Christos Faloutsos,et al. Polonium: Tera-Scale Graph Mining and Inference for Malware Detection , 2011 .
[12] Úlfar Erlingsson,et al. Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries , 2015, Proc. Priv. Enhancing Technol..
[13] Calton Pu,et al. Dynamic Differential Location Privacy with Personalized Error Bounds , 2017, NDSS.
[14] Ninghui Li,et al. Locally Differentially Private Protocols for Frequency Estimation , 2017, USENIX Security Symposium.
[15] Ninghui Li,et al. Membership privacy: a unifying framework for privacy definitions , 2013, CCS.
[16] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[17] Muddassar Farooq,et al. IMAD: in-execution malware analysis and detection , 2009, GECCO.
[18] Jiming Chen,et al. CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy , 2018, CCS.
[19] Josep Domingo-Ferrer,et al. Enhancing data utility in differential privacy via microaggregation-based k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{docume , 2014, The VLDB Journal.
[20] Hiroshi Nakagawa,et al. Bayesian Differential Privacy on Correlated Data , 2015, SIGMOD Conference.
[21] Kun Guo,et al. Data mining for the online retail industry: A case study of RFM model-based customer segmentation using data mining , 2012 .
[22] Raef Bassily,et al. Practical Locally Private Heavy Hitters , 2017, NIPS.
[23] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[24] Duen Horng Chau,et al. Guilt by association: large scale malware detection by mining file-relation graphs , 2014, KDD.
[25] Yin Yang,et al. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy , 2017, CCS.
[26] H. Storkel. Learning New Words , 2001 .
[27] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[28] Uri Stemmer,et al. Heavy Hitters and the Structure of Local Privacy , 2017, PODS.
[29] Prateek Mittal,et al. Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing , 2019, Proc. Priv. Enhancing Technol..
[30] Benjamin Livshits,et al. BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model , 2017, USENIX Security Symposium.
[31] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[32] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[33] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[34] Shiva Prasad Kasiviswanathan,et al. On the 'Semantics' of Differential Privacy: A Bayesian Formulation , 2008, J. Priv. Confidentiality.
[35] Divesh Srivastava,et al. Marginal Release Under Local Differential Privacy , 2017, SIGMOD Conference.
[36] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[37] Ali Inan,et al. Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms , 2020, IEEE Transactions on Dependable and Secure Computing.
[38] Catuscia Palamidessi,et al. Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.
[39] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[40] David Sánchez,et al. Ontology-based semantic similarity: A new feature-based approach , 2012, Expert Syst. Appl..
[41] Raef Bassily,et al. Local, Private, Efficient Protocols for Succinct Histograms , 2015, STOC.
[42] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[43] Pramod Viswanath,et al. The Composition Theorem for Differential Privacy , 2013, IEEE Transactions on Information Theory.