1. Acharya, J., Sun, Z., Zhang, H.: Hadamard response: estimating distributions privately, efficiently, and with little communication. In: Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (2019)
2. Bassily, R., Nissim, K., Stemmer, U., Guha Thakurta, A.: Practical locally private heavy hitters. In: Advances in Neural Information Processing Systems, vol. 30 (2017)
3. Bassily, R., Smith, A.: Local, private, efficient protocols for succinct histograms. In: Proceedings of the 47th Annual ACM Symposium on Theory of Computing (2015)
4. Cao, X., Jia, J., Gong, N.Z.: Data poisoning attacks to local differential privacy protocols. In: Proceedings of the 30th USENIX Security Symposium (2021)
5. Cheu, A., Smith, A., Ullman, J.: Manipulation attacks in local differential privacy. In: Proceedings of the 42nd IEEE Symposium on Security and Privacy (2021)