Achieving differential privacy of data disclosure in the smart grid
暂无分享,去创建一个
Jing Zhao | Yu Wang | Xiangyang Li | Taeho Jung | Yu Wang | Xiangyang Li | Jing Zhao | Taeho Jung
[1] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[2] Yunhao Liu,et al. Verifiable private multi-party computation: Ranging and ranking , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[4] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[5] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[6] Radu Zmeureanu,et al. Nonintrusive load disaggregation computer program to estimate the energy consumption of major end uses in residential buildings , 2000 .
[7] Xiang-Yang Li,et al. A General Framework for Privacy-Preserving Distributed Greedy Algorithm , 2013, ArXiv.
[8] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[9] Aaron Roth,et al. A learning theory approach to non-interactive database privacy , 2008, STOC.
[10] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[11] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[12] Kevin D. Glazebrook,et al. Multi-Armed Bandit Allocation Indices: Gittins/Multi-Armed Bandit Allocation Indices , 2011 .
[13] Shaojie Tang,et al. Smoothing the energy consumption: Peak demand reduction in smart grid , 2013, 2013 Proceedings IEEE INFOCOM.
[14] J. Bather,et al. Multi‐Armed Bandit Allocation Indices , 1990 .
[15] Wenyuan Xu,et al. Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.
[16] Steven B. Leeb,et al. Power signature analysis , 2003 .
[17] J. Zico Kolter,et al. REDD : A Public Data Set for Energy Disaggregation Research , 2011 .
[18] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[19] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[20] Sébastien Bubeck,et al. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems , 2012, Found. Trends Mach. Learn..
[21] Aaron Roth,et al. A learning theory approach to noninteractive database privacy , 2011, JACM.
[22] Patrick D. McDaniel,et al. Protecting consumer privacy from electric load monitoring , 2011, CCS '11.
[23] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[24] Christian M. Ernst,et al. Multi-armed Bandit Allocation Indices , 1989 .
[25] Yuan Qi,et al. Minimizing private data disclosures in the smart grid , 2012, CCS '12.
[26] Daniel A. Spielman,et al. Spectral Graph Theory and its Applications , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[27] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[28] T. Suzuki,et al. Nonintrusive appliance load monitoring based on integer programming , 2008, 2008 SICE Annual Conference.
[29] Shwetak N. Patel,et al. ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home , 2010, UbiComp.
[30] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[31] Tim Roughgarden,et al. Universally utility-maximizing privacy mechanisms , 2008, STOC '09.
[32] Yunhao Liu,et al. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks , 2012, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[33] G. Pascal Zachary. Saving smart meters from a backlash , 2011 .