Author:
Liu Peng,Xu YuanXin,Jiang Quan,Tang Yuwei,Guo Yameng,Wang Li-e,Li Xianxian
Funder
National Natural Science Foundation of China
Guangxi Natural Science Foundation
Subject
Artificial Intelligence,Cognitive Neuroscience,Computer Science Applications
Reference31 articles.
1. K-isomorphism:privacy preserving network publication against structural attacks[C];Cheng,2010
2. Anonymizing bipartite graph data using safe groupings[J];Cormode;VLDB J. Int. J. Very Large Data Bases,2010
3. Calibrating noise to sensitivity in private data analysis[J];Dwork;Proc. VLDB Endow.,2006
4. Publishing attributed social graphs with formal privacy guarantees[C];Jorgensen,2016
5. Boosting the accuracy of differentially private histograms through consistency[J];Hay;Proc. VLDB Endow.,2010
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献