Author:
Vivek Sridhar Mallya P. V.,Ajith Aparna,Sangeetha T. R.,Krishnan Arya,Narayanan Gayathri
Reference12 articles.
1. Roth A (2010) Algorithms for preserving differential privacy, CMU-CS-10-135 (references)
2. Kressner D, Implementing differential privacy. Institute of Information System, School of Business and Economics Humboldt University of Berlin, Term paper for the IT Security Seminar
3. Ding Z, Wang Y, Wang G, Zhang D, Kifer D (2019) Detecting violations of differential privacy.
arXiv:1805.10277v4
[cs.CR]
4. Baldini G, Giuliani R (2017) Analysis of the privacy threat in vehicular ad-hoc networks due to radio frequency fingerprinting
5. Nelson B, Olovsson T (2017) Introducing differential privacy to the automotive domain: opportunities and challenges. In: 2017 IEEE 86th vehicular technology conference.
https://doi.org/10.1109/vtcfall.2017.8288389
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献