A Novel Study of Different Privacy Frameworks Metrics and Patterns
暂无分享,去创建一个
[1] Ohad Shamir,et al. Learnability, Stability and Uniform Convergence , 2010, J. Mach. Learn. Res..
[2] Aaron Roth,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[3] Ashwin Machanavajjhala,et al. Pufferfish , 2014, ACM Trans. Database Syst..
[4] Bing-Rong Lin,et al. Towards a Systematic Analysis of Privacy Definitions , 2014, J. Priv. Confidentiality.
[5] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[6] Hongxia Jin,et al. Private spatial data aggregation in the local setting , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[7] Aftab Ahmad,et al. A Novel Information Privacy Metric , 2018 .
[8] Benjamin Livshits,et al. BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model , 2017, USENIX Security Symposium.
[9] Ashwin Machanavajjhala,et al. Blowfish privacy: tuning privacy-utility trade-offs using policies , 2013, SIGMOD Conference.
[10] Wojciech Szpankowski,et al. The Trade-Off Between Privacy and Fidelity via Ehrhart Theory , 2018, IEEE Transactions on Information Theory.
[11] Bjorn Bebensee,et al. Local Differential Privacy: a tutorial , 2019, ArXiv.
[12] Houbing Song,et al. ESOT: a new privacy model for preserving location privacy in Internet of Things , 2018, Telecommun. Syst..
[13] Jaap-Henk Hoepman,et al. Privacy Design Strategies (The Little Blue Book) , 2018 .
[14] Ram Rajagopal,et al. Generative Adversarial Privacy: A Data-Driven Approach to Information-Theoretic Privacy , 2018, 2018 52nd Asilomar Conference on Signals, Systems, and Computers.
[15] Wojciech Szpankowski,et al. Preserving Privacy and Fidelity via Ehrhart Theory , 2018, 2018 IEEE International Symposium on Information Theory (ISIT).
[16] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[17] Asadullah Shah,et al. Security and privacy for IoT and fog computing paradigm , 2018, 2018 15th Learning and Technology Conference (L&T).
[18] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[19] Ram Rajagopal,et al. Context-Aware Generative Adversarial Privacy , 2017, Entropy.