메뉴 건너뛰기




Volumn 14-17-June-2015, Issue , 2015, Pages 127-135

Local, private, efficient protocols for succinct histograms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; EFFICIENCY; ERRORS; FREQUENCY ESTIMATION; GRAPHIC METHODS;

EID: 84958771236     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2746539.2746632     Document Type: Conference Paper
Times cited : (528)

References (22)
  • 1
    • 28444434728 scopus 로고    scopus 로고
    • A framework for high-accuracy privacy-preserving mining
    • IEEE Computer Society
    • S. Agrawal and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In ICDE, pages 193-204. IEEE Computer Society, 2005.
    • (2005) ICDE , pp. 193-204
    • Agrawal, S.1    Haritsa, J.R.2
  • 3
    • 84871941776 scopus 로고    scopus 로고
    • The johnson-lindenstrauss transform itself preserves differential privacy
    • FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012
    • J. Blocki, A. Blum, A. Datta, and O. Sheffet. The johnson-lindenstrauss transform itself preserves differential privacy. In 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 410-419, 2012.
    • (2012) 53rd Annual IEEE Symposium on Foundations of Computer Science , pp. 410-419
    • Blocki, J.1    Blum, A.2    Datta, A.3    Sheffet, O.4
  • 5
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving datamining on vertically partitioned databases
    • Springer
    • C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, LNCS, pages 528-544. Springer, 2004.
    • (2004) CRYPTO, LNCS , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 7
    • 77954717626 scopus 로고    scopus 로고
    • Differential privacy under continual observation
    • ACM
    • C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum. Differential privacy under continual observation. STOC '10, pages 715-724. ACM, 2010.
    • (2010) STOC '10 , pp. 715-724
    • Dwork, C.1    Naor, M.2    Pitassi, T.3    Rothblum, G.N.4
  • 10
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • ACM
    • A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222. ACM, 2003.
    • (2003) PODS , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 12
    • 0036041770 scopus 로고    scopus 로고
    • Near-optimal sparse fourier representations via sampling
    • ACM
    • A. C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, and M. Strauss. Near-optimal sparse fourier representations via sampling. STOC 2002, pages 152-161. ACM, 2002.
    • (2002) STOC , pp. 152-161
    • Gilbert, A.C.1    Guha, S.2    Indyk, P.3    Muthukrishnan, S.4    Strauss, M.5
  • 14
    • 84883765200 scopus 로고    scopus 로고
    • Distributed private heavy hitters
    • J. Hsu, S. Khanna, and A. Roth. Distributed private heavy hitters. In ICALP (1), pages 461-472, 2012.
    • (2012) ICALP , Issue.1 , pp. 461-472
    • Hsu, J.1    Khanna, S.2    Roth, A.3
  • 16
    • 0032202014 scopus 로고    scopus 로고
    • Efficient noise-tolerant learning from statistical queries
    • Preliminary version in proceedings of STOC'93
    • M. Kearns. Efficient noise-tolerant learning from statistical queries. Journal of the ACM, 45(6):983-1006, 1998. ISSN 0004-5411. Preliminary version in proceedings of STOC'93.
    • (1998) Journal of the ACM , vol.45 , Issue.6 , pp. 983-1006
    • Kearns, M.1
  • 18
    • 85006528164 scopus 로고
    • Learning decision trees using the fourier spectrum
    • ACM
    • E. Kushilevitz and Y. Mansour. Learning decision trees using the fourier spectrum. STOC'91, pages 455-464. ACM, 1991.
    • (1991) STOC'91 , pp. 455-464
    • Kushilevitz, E.1    Mansour, Y.2
  • 19
    • 0001035413 scopus 로고
    • On the method of bounded differences
    • Cambridge University Press
    • C. McDiarmid. On the method of bounded differences. In In Surveys in Combinatorics, pages 148-188. Cambridge University Press, 1989.
    • (1989) Surveys in Combinatorics , pp. 148-188
    • McDiarmid, C.1
  • 21
    • 34250642810 scopus 로고    scopus 로고
    • Privacy via pseudorandom sketches
    • ACM
    • N. Mishra and M. Sandler. Privacy via pseudorandom sketches. In PODS, pages 143-152. ACM, 2006.
    • (2006) PODS , pp. 143-152
    • Mishra, N.1    Sandler, M.2
  • 22
    • 84892392012 scopus 로고    scopus 로고
    • Random projections, graph sparsification, and differential privacy
    • J. Upadhyay. Random projections, graph sparsification, and differential privacy. In Advances in Cryptology - ASIACRYPT, pages 276-295, 2013.
    • (2013) Advances in Cryptology - ASIACRYPT , pp. 276-295
    • Upadhyay, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.