Reference17 articles.
1. Dwork C, Roth A (2013) The algorithmic foundations of differential privacy. Theor Comput Sci 9(3–4):211–407
2. Xiong X, Liu S, Li D, Cai Z, Niu X (2020) A comprehensive survey on local differential privacy. Secur Commun Netw 2020 (Article ID 8829523):29. https://doi.org/10.1155/2020/8829523
3. Shahani S, Abraham J, Venkateswaran R (2017) Distributed data aggregation with privacy preservation at endpoint. In: International conference on management of data (COMAD). Computer Society of India (CSI) SIGDATA, India
4. Dwork C (2006) Differential privacy. In: Automata, languages and programming, vol 4052 of Lecture notes in computer science. Springer, Berlin, pp 1–12
5. Karr A, Kohnen C, Oganian A, Reiter J, Sanil A (2006) A Framework For Evaluating The Utility Of Data Altered To Protect Confidentiality. Am Stat J 60(3):224–232
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Techniques for Privacy-Preserving Data Aggregation in an Untrusted Distributed Environment;Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD);2023-01-04