메뉴 건너뛰기




Volumn 2015-May, Issue , 2015, Pages 731-745

Private release of graph statistics using ladder functions

Author keywords

Differential privacy; Local sensitivity; Subgraph counting

Indexed keywords

DATA PRIVACY; LADDERS;

EID: 84956480162     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2723372.2737785     Document Type: Conference Paper
Times cited : (116)

References (38)
  • 2
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007.
    • (2007) WWW , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.M.3
  • 4
    • 0031198630 scopus 로고    scopus 로고
    • On a relation between graph edit distance and maximum common subgraph
    • Aug.
    • H. Bunke. On a relation between graph edit distance and maximum common subgraph. Pattern Recogn. Lett., 18(9):689-694, Aug. 1997.
    • (1997) Pattern Recogn. Lett. , vol.18 , Issue.9 , pp. 689-694
    • Bunke, H.1
  • 5
    • 84880566095 scopus 로고    scopus 로고
    • Recursive mechanism: Towards node differential privacy and unrestricted joins
    • S. Chen and S. Zhou. Recursive mechanism: Towards node differential privacy and unrestricted joins. In SIGMOD, pages 653-664, 2013.
    • (2013) SIGMOD , pp. 653-664
    • Chen, S.1    Zhou, S.2
  • 6
    • 75949123863 scopus 로고    scopus 로고
    • Anonymizing bipartite graph data using safe groupings
    • G. Cormode, D. Srivastava, T. Yu, and Q. Zhang. Anonymizing bipartite graph data using safe groupings. VLDB J., pages 115-139, 2010.
    • (2010) VLDB J. , pp. 115-139
    • Cormode, G.1    Srivastava, D.2    Yu, T.3    Zhang, Q.4
  • 7
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, pages 1-12, 2006.
    • (2006) ICALP , pp. 1-12
    • Dwork, C.1
  • 8
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 9
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract)
    • C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
    • (2009) TCC , pp. 496-502
    • Dwork, C.1
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 12
    • 77957582791 scopus 로고    scopus 로고
    • Differential privacy for statistics: What we know and what we want to learn
    • C. Dwork and A. Smith. Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality, 1(2):2, 2010.
    • (2010) Journal of Privacy and Confidentiality , vol.1 , Issue.2 , pp. 2
    • Dwork, C.1    Smith, A.2
  • 13
    • 84881655597 scopus 로고    scopus 로고
    • Moment-based estimation of stochastic kronecker graph parameters
    • D. F. Gleich and A. B. Owen. Moment-based estimation of stochastic kronecker graph parameters. Internet Mathematics, 8(3):232-256, 2012.
    • (2012) Internet Mathematics , vol.8 , Issue.3 , pp. 232-256
    • Gleich, D.F.1    Owen, A.B.2
  • 14
    • 84879816605 scopus 로고    scopus 로고
    • Beyond worst-case analysis in private singular vector computation
    • M. Hardt and A. Roth. Beyond worst-case analysis in private singular vector computation. In STOC, 2013.
    • (2013) STOC
    • Hardt, M.1    Roth, A.2
  • 15
    • 77951192010 scopus 로고    scopus 로고
    • Accurate estimation of the degree distribution of private networks
    • M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate estimation of the degree distribution of private networks. In ICDM, pages 169-178, 2009.
    • (2009) ICDM , pp. 169-178
    • Hay, M.1    Li, C.2    Miklau, G.3    Jensen, D.4
  • 16
    • 78650524241 scopus 로고    scopus 로고
    • Resisting structural re-identification in anonymized social networks
    • M. Hay, G. Miklau, D. Jensen, D. F. Towsley, and C. Li. Resisting structural re-identification in anonymized social networks. VLDB J., pages 797-823, 2010.
    • (2010) VLDB J. , pp. 797-823
    • Hay, M.1    Miklau, G.2    Jensen, D.3    Towsley, D.F.4    Li, C.5
  • 18
    • 84867507326 scopus 로고    scopus 로고
    • Differentially private graphical degree sequences and synthetic graphs
    • Springer
    • V. Karwa and A. B. Slavković. Differentially private graphical degree sequences and synthetic graphs. In Privacy in Statistical Databases, pages 273-285. Springer, 2012.
    • (2012) Privacy in Statistical Databases , pp. 273-285
    • Karwa, V.1    Slavković, A.B.2
  • 22
    • 84880543792 scopus 로고    scopus 로고
    • Information preservation in statistical privacy and Bayesian estimation of unattributed histograms
    • B.-R. Lin and D. Kifer. Information preservation in statistical privacy and bayesian estimation of unattributed histograms. In SIGMOD, pages 677-688, 2013.
    • (2013) SIGMOD , pp. 677-688
    • Lin, B.-R.1    Kifer, D.2
  • 23
    • 57149126815 scopus 로고    scopus 로고
    • Towards identity anonymization on graphs
    • K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, pages 93-106, 2008.
    • (2008) SIGMOD , pp. 93-106
    • Liu, K.1    Terzi, E.2
  • 24
    • 84907033180 scopus 로고    scopus 로고
    • Exponential random graph estimation under differential privacy
    • W. Lu and G. Miklau. Exponential random graph estimation under differential privacy. In KDD, pages 921-930, 2014.
    • (2014) KDD , pp. 921-930
    • Lu, W.1    Miklau, G.2
  • 25
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, 2007.
    • (2007) FOCS , pp. 94-103
    • McSherry, F.1    Talwar, K.2
  • 26
    • 84864136545 scopus 로고    scopus 로고
    • A differentially private estimator for the stochastic kronecker graph model
    • ACM
    • D. Mir and R. N. Wright. A differentially private estimator for the stochastic kronecker graph model. In Proceedings of the 2012 Joint EDBT/ICDT Workshops, pages 167-176. ACM, 2012.
    • (2012) Proceedings of the 2012 Joint EDBT/ICDT Workshops , pp. 167-176
    • Mir, D.1    Wright, R.N.2
  • 29
    • 35448955271 scopus 로고    scopus 로고
    • Smooth sensitivity and sampling in private data analysis
    • K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
    • (2007) STOC , pp. 75-84
    • Nissim, K.1    Raskhodnikova, S.2    Smith, A.3
  • 30
    • 84893263337 scopus 로고    scopus 로고
    • Privacy and mechanism design
    • M. M. Pai and A. Roth. Privacy and mechanism design. ACM SIGecom Exchanges, 12(1):8-29, 2013.
    • (2013) ACM SIGecom Exchanges , vol.12 , Issue.1 , pp. 8-29
    • Pai, M.M.1    Roth, A.2
  • 31
    • 84901767186 scopus 로고    scopus 로고
    • Calibrating data to sensitivity in private data analysis
    • D. Proserpio, S. Goldberg, and F. McSherry. Calibrating data to sensitivity in private data analysis. PVLDB, 7(8), 2014.
    • (2014) PVLDB , vol.7 , Issue.8
    • Proserpio, D.1    Goldberg, S.2    McSherry, F.3
  • 32
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 33
    • 82955196835 scopus 로고    scopus 로고
    • Sharing graphs using differentially private graph models
    • ACM
    • A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC, pages 81-98. ACM, 2011.
    • (2011) IMC , pp. 81-98
    • Sala, A.1    Zhao, X.2    Wilson, C.3    Zheng, H.4    Zhao, B.Y.5
  • 34
    • 84871834738 scopus 로고    scopus 로고
    • Anonymization of centralized and distributed social networks by sequential clustering
    • T. Tassa and D. Cohen. Anonymization of centralized and distributed social networks by sequential clustering. TKDE, 25(2), 2013.
    • (2013) TKDE , vol.25 , Issue.2
    • Tassa, T.1    Cohen, D.2
  • 35
    • 84881628005 scopus 로고    scopus 로고
    • Preserving differential privacy in degree-correlation based graph generation
    • Aug.
    • Y. Wang and X. Wu. Preserving differential privacy in degree-correlation based graph generation. Trans. Data Privacy, 6(2):127-145, Aug. 2013.
    • (2013) Trans. Data Privacy , vol.6 , Issue.2 , pp. 127-145
    • Wang, Y.1    Wu, X.2
  • 37
    • 52649120205 scopus 로고    scopus 로고
    • Preserving privacy in social networks against neighborhood attacks
    • B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, pages 506-515, 2008.
    • (2008) ICDE , pp. 506-515
    • Zhou, B.1    Pei, J.2
  • 38
    • 84865065669 scopus 로고    scopus 로고
    • K-automorphism: A general framework for privacy preserving network publication
    • L. Zou, L. Chen, and M. T. Özsu. K-automorphism: A general framework for privacy preserving network publication. In PVLDB, pages 946-957, 2009.
    • (2009) PVLDB , pp. 946-957
    • Zou, L.1    Chen, L.2    Özsu, M.T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.