共 30 条
- [1] Dwork C., Differential privacy, Proc of the 33rd Int Colloquium on Automata, Languages and Programming, pp. 1-12, (2006)
- [2] Backstrom L., Dwork C., Kleinberg J., Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, Proc of the 16th Int Conf on World Wide Web, pp. 181-190, (2007)
- [3] Hay M., Li C., Miklau G., Et al., Accurate estimation of the degree distribution of private networks, Proc of the 11th IEEE Int Conf on Data Mining, pp. 169-178, (2009)
- [4] Kasiviswanathan S.P., Nissim K., Raskhodnikova S., Et al., Analyzing graphs with node differential privacy, Proc of the 10th Conf on Theory of Cryptography, pp. 457-476, (2013)
- [5] Blocki J., Blum A., Datta A., Et al., Differentially private data analysis of social networks via restricted sensitivity, Proc of the 4th Conf on Innovations in Theoretical Computer Science, pp. 87-96, (2013)
- [6] Raskhodnikova S., Smith A., Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism, Proc of the 57th IEEE Annual Symp on Foundations of Computer Science, pp. 495-504, (2016)
- [7] Day W.-Y., Li N., Lyu M., Publishing graph degree distribution with node differential privacy, Proc of the 16th Int Conf on Management of Data, pp. 123-138, (2016)
- [8] Samarati P., Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, 13, 6, pp. 1010-1027, (2001)
- [9] Machanavajjhala A., Gehrke J., Kifer D., Et al., l-diversity: Privacy beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, 1, 1, pp. 1-52, (2007)
- [10] Dwork C., Naor M., Pitassi T., Et al., Differential privacy under continual observation, Proc of the 42nd ACM Symp on Theory of Computing, pp. 715-724, (2010)