메뉴 건너뛰기




Volumn , Issue , 2012, Pages 32-43

Differentially private histogram publication

Author keywords

[No Author keywords available]

Indexed keywords

ANALYTICAL TOOL; BACKGROUND KNOWLEDGE; DIFFERENTIAL PRIVACIES; NOISE INJECTION; NOVEL ALGORITHM; RANGE QUERY; REAL DATA SETS; RELATIVE ORDER; SENSITIVE DATAS; SENSITIVE INFORMATIONS; STATISTICAL QUERIES; STRUCTURE COMPUTATION;

EID: 84864195481     PISSN: 10844627     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2012.48     Document Type: Conference Paper
Times cited : (127)

References (23)
  • 2
    • 74049130896 scopus 로고    scopus 로고
    • Learning your identity and disease from research papers: Information leaks in genome wide association study
    • R. Wang, Y. Li, X. Wang, H. Tang, and X. Zhou, "Learning your identity and disease from research papers: Information leaks in genome wide association study," in ACM CCS, 2009.
    • (2009) ACM CCS
    • Wang, R.1    Li, Y.2    Wang, X.3    Tang, H.4    Zhou, X.5
  • 3
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in TCC, 2006, pp. 265-284.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 4
    • 35449000081 scopus 로고    scopus 로고
    • The price of privacy and the limits of LP decoding
    • C. Dwork, F. McSherry, and K. Talwar, "The price of privacy and the limits of LP decoding," in STOC, 2007, pp. 85-94.
    • (2007) STOC , pp. 85-94
    • Dwork, C.1    McSherry, F.2    Talwar, K.3
  • 5
    • 78751522594 scopus 로고    scopus 로고
    • Boosting and differential privacy
    • C. Dwork, G. N. Rothblum, and S. P. Vadhan, "Boosting and differential privacy," in FOCS, pp. 51-60.
    • FOCS , pp. 51-60
    • Dwork, C.1    Rothblum, G.N.2    Vadhan, S.P.3
  • 6
    • 78650518102 scopus 로고    scopus 로고
    • Boosting the accuracy of differentially private histograms through consistency
    • M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," PVLDB, vol. 3, no. 1, pp. 1021-1032, 2010.
    • (2010) PVLDB , vol.3 , Issue.1 , pp. 1021-1032
    • Hay, M.1    Rastogi, V.2    Miklau, G.3    Suciu, D.4
  • 7
    • 77954715960 scopus 로고    scopus 로고
    • Optimizing linear counting queries under differential privacy
    • C. Li, M. Hay, V. Rastogi, G. Miklau, and A. McGregor, "Optimizing linear counting queries under differential privacy," in PODS, 2010, pp. 123-134.
    • (2010) PODS , pp. 123-134
    • Li, C.1    Hay, M.2    Rastogi, V.3    Miklau, G.4    McGregor, A.5
  • 8
    • 77952787160 scopus 로고    scopus 로고
    • Differential privacy via wavelet transforms
    • X. Xiao, G. Wang, and J. Gehrke, "Differential privacy via wavelet transforms," in ICDE, 2010, pp. 225-236.
    • (2010) ICDE , pp. 225-236
    • Xiao, X.1    Wang, G.2    Gehrke, J.3
  • 11
    • 33745187544 scopus 로고    scopus 로고
    • Approximation and streaming algorithms for histogram construction problems
    • S. Guha, N. Koudas, and K. Shim, "Approximation and streaming algorithms for histogram construction problems," ACM TODS, vol. 31, no. 1, pp. 396-438, 2006.
    • (2006) ACM TODS , vol.31 , Issue.1 , pp. 396-438
    • Guha, S.1    Koudas, N.2    Shim, K.3
  • 12
    • 77955334135 scopus 로고    scopus 로고
    • Private and continual release of statistics
    • T.-H. H. Chan, E. Shi, and D. Song, "Private and continual release of statistics," in ICALP (2), 2010, pp. 405-417.
    • (2010) ICALP (2) , pp. 405-417
    • Chan, T.-H.H.1    Shi, E.2    Song, D.3
  • 13
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork, "Differential privacy: A survey of results," in TAMC, 2008, pp. 1-19.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 14
    • 77956209107 scopus 로고    scopus 로고
    • Discovering frequent patterns in sensitive data
    • R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta, "Discovering frequent patterns in sensitive data," in KDD, 2010, pp. 503-512.
    • (2010) KDD , pp. 503-512
    • Bhaskar, R.1    Laxman, S.2    Smith, A.3    Thakurta, A.4
  • 15
    • 77956195013 scopus 로고    scopus 로고
    • Data mining with differential privacy
    • A. Friedman and A. Schuster, "Data mining with differential privacy," in KDD, 2010, pp. 493-502.
    • (2010) KDD , pp. 493-502
    • Friedman, A.1    Schuster, A.2
  • 16
    • 84865663496 scopus 로고    scopus 로고
    • Releasing search queries and clicks privately
    • A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, "Releasing search queries and clicks privately," in WWW, 2009, pp. 171-180.
    • (2009) WWW , pp. 171-180
    • Korolova, A.1    Kenthapadi, K.2    Mishra, N.3    Ntoulas, A.4
  • 17
    • 79959984226 scopus 로고    scopus 로고
    • Publishing search logs - A comparative study of privacy guarantees
    • in press
    • M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke, "Publishing search logs - a comparative study of privacy guarantees," in TKDE, in press.
    • TKDE
    • Götz, M.1    Machanavajjhala, A.2    Wang, G.3    Xiao, X.4    Gehrke, J.5
  • 18
    • 78149355964 scopus 로고    scopus 로고
    • Differentially-private network trace analysis
    • F. McSherry and R. Mahajan, "Differentially-private network trace analysis," in SIGCOMM, 2010, pp. 123-134.
    • (2010) SIGCOMM , pp. 123-134
    • McSherry, F.1    Mahajan, R.2
  • 19
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to noninteractive database privacy
    • A. Blum, K. Ligett, and A. Roth, "A learning theory approach to noninteractive database privacy," in STOC, 2008, pp. 609-618.
    • (2008) STOC , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 20
    • 35448955720 scopus 로고    scopus 로고
    • Privacy, accuracy, and consistency too: A holistic solution to contingency table release
    • B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar, "Privacy, accuracy, and consistency too: a holistic solution to contingency table release," in PODS, 2007, pp. 273-282.
    • (2007) PODS , pp. 273-282
    • Barak, B.1    Chaudhuri, K.2    Dwork, C.3    Kale, S.4    McSherry, F.5    Talwar, K.6
  • 21
    • 79959954388 scopus 로고    scopus 로고
    • Differentially private data cubes: Optimizing noise sources and consistency
    • B. Ding, M. Winslett, J. Han, and Z. Li, "Differentially private data cubes: optimizing noise sources and consistency," in SIGMOD, 2011, pp. 217-228.
    • (2011) SIGMOD , pp. 217-228
    • Ding, B.1    Winslett, M.2    Han, J.3    Li, Z.4
  • 22
    • 79959998772 scopus 로고    scopus 로고
    • Ireduct: Differential privacy with reduced relative errors
    • X. Xiao, G. Bender, M. Hay, and J. Gehrke, "ireduct: differential privacy with reduced relative errors," in SIGMOD, 2011, pp. 229-240.
    • (2011) SIGMOD , pp. 229-240
    • Xiao, X.1    Bender, G.2    Hay, M.3    Gehrke, J.4
  • 23
    • 77954711910 scopus 로고    scopus 로고
    • Differentially private aggregation of distributed time-series with transformation and encryption
    • V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in SIGMOD, 2010, pp. 735-746.
    • (2010) SIGMOD , pp. 735-746
    • Rastogi, V.1    Nath, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.