-
1
-
-
77956382087
-
A survey of mobile phone sensing
-
Sep.
-
N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, "A survey of mobile phone sensing," IEEE Commun. Mag., vol. 48, no. 9, pp. 140-150, Sep. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
2
-
-
76749103805
-
Privacy-conscious locationbased queries in mobile environments
-
Mar.
-
J. Xu, X. Tang, H. Hu, and J. Du, "Privacy-conscious locationbased queries in mobile environments," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 3, pp. 313-326, Mar. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.3
, pp. 313-326
-
-
Xu, J.1
Tang, X.2
Hu, H.3
Du, J.4
-
3
-
-
85016706295
-
Real-time disease surveillance using twitter data: Demonstration on flu and cancer
-
K. Lee, A. Agrawal, and A. Choudhary, "Real-time disease surveillance using twitter data: Demonstration on flu and cancer," in Proc. ACM SIGKDD, 2013, pp. 1474-1477.
-
(2013)
Proc. ACM SIGKDD
, pp. 1474-1477
-
-
Lee, K.1
Agrawal, A.2
Choudhary, A.3
-
4
-
-
84904608123
-
Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
-
Aug.
-
H. Li, X. Lin, H. Yang, X. Liang, R. Lu, and X. Shen, "Eppdr: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 8, pp. 2053-2064, Aug. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.8
, pp. 2053-2064
-
-
Li, H.1
Lin, X.2
Yang, H.3
Liang, X.4
Lu, R.5
Shen, X.6
-
5
-
-
84906786016
-
Privacy-aware smart metering: A survey
-
Jul.-Sep.
-
S. Finster and I. Baumgart, "Privacy-aware smart metering: A survey," IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1732-1745, Jul.-Sep. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.3
, pp. 1732-1745
-
-
Finster, S.1
Baumgart, I.2
-
6
-
-
84862787823
-
Rcda: Recoverable concealed data aggregation for data integrity in wireless sensor networks
-
Apr.
-
C. M. Chen, Y. H. Lin, Y. C. Lin, and H. M. Sun, "Rcda: Recoverable concealed data aggregation for data integrity in wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 4, pp. 727-734, Apr. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.4
, pp. 727-734
-
-
Chen, C.M.1
Lin, Y.H.2
Lin, Y.C.3
Sun, H.M.4
-
7
-
-
84909620009
-
Monitoring web browsing behavior with differential privacy
-
L. Fan, L. Bonomi, L. Xiong, and V. Sunderam, "Monitoring web browsing behavior with differential privacy," in Proc. IEEE 23rd Int. Conf. World Wide Web, 2014, pp. 177-188.
-
(2014)
Proc. IEEE 23rd Int. Conf. World Wide Web
, pp. 177-188
-
-
Fan, L.1
Bonomi, L.2
Xiong, L.3
Sunderam, V.4
-
8
-
-
84926322942
-
An adaptive approach to real-time aggregate monitoring with differential privacy
-
Sep.
-
L. Fan and L. Xiong, "An adaptive approach to real-time aggregate monitoring with differential privacy," IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2094-2106, Sep. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.9
, pp. 2094-2106
-
-
Fan, L.1
Xiong, L.2
-
9
-
-
84881136541
-
Differentially private multi-dimensional time series release for traffic monitoring
-
L. Fan, L. Xiong, and V. Sunderam, "Differentially private multi-dimensional time series release for traffic monitoring," in Proc. 27th Int. Conf. Data Appl. Security Privacy XXVII, 2013, pp. 33-48.
-
(2013)
Proc. 27th Int. Conf. Data Appl. Security Privacy XXVII
, pp. 33-48
-
-
Fan, L.1
Xiong, L.2
Sunderam, V.3
-
10
-
-
84904437867
-
Privacy-preserving high-quality map generation with participatory sensing
-
X. Chen, X. Wu, X. Y. Li, Y. He, and Y. Liu, "Privacy-preserving high-quality map generation with participatory sensing," in Proc. IEEE INFOCOM, 2014, pp. 2310-2318.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2310-2318
-
-
Chen, X.1
Wu, X.2
Li, X.Y.3
He, Y.4
Liu, Y.5
-
11
-
-
84898685015
-
Efficient and privacy-aware data aggregation in mobile sensing
-
Mar/Apr.
-
Q. Li, G. Cao, and T. F. La Porta, "Efficient and privacy-aware data aggregation in mobile sensing," IEEE Trans. Dependable Secur. Comput., vol. 11, no. 2, pp. 115-129, Mar/Apr. 2014.
-
(2014)
IEEE Trans. Dependable Secur. Comput.
, vol.11
, Issue.2
, pp. 115-129
-
-
Li, Q.1
Cao, G.2
La Porta, T.F.3
-
12
-
-
84864583229
-
Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
Sep.
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, Sep. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
13
-
-
80052696161
-
A survey on privacy in mobile participatory sensing applications
-
D. Christin, A. Reinhardt, S. S. Kanhere, and M. Hollick, "A survey on privacy in mobile participatory sensing applications," J. Syst. Softw., vol. 84, no. 11, pp. 1928-1946, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1928-1946
-
-
Christin, D.1
Reinhardt, A.2
Kanhere, S.S.3
Hollick, M.4
-
14
-
-
84862830668
-
Fingerprinting mobile user positions in sensor networks: Attacks and countermeasures
-
Apr.
-
L. Mo, X. Jiang, and L. J. Guibas, "Fingerprinting mobile user positions in sensor networks: Attacks and countermeasures," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 4, pp. 676-683, Apr. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.4
, pp. 676-683
-
-
Mo, L.1
Jiang, X.2
Guibas, L.J.3
-
15
-
-
84889000328
-
Identity, location, disease and more: Inferring your secrets from android public resources
-
X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X. Wang, C. A. Gunter, and K. Nahrstedt, "Identity, location, disease and more: Inferring your secrets from android public resources," in Proc. ACMSIGSAC Conf. Comput. Commun. Security, 2013, pp. 1017-1028.
-
(2013)
Proc. ACMSIGSAC Conf. Comput. Commun. Security
, pp. 1017-1028
-
-
Zhou, X.1
Demetriou, S.2
He, D.3
Naveed, M.4
Pan, X.5
Wang, X.6
Gunter, C.A.7
Nahrstedt, K.8
-
16
-
-
84902299754
-
Human-factoraware privacy-preserving aggregation in smart grid
-
Jun.
-
W. Jia, H. Zhu, Z. Cao, X. Dong, and C. Xiao, "Human-factoraware privacy-preserving aggregation in smart grid," IEEE Syst. J., vol. 8, no. 2, pp. 598-607, Jun. 2014.
-
(2014)
IEEE Syst. J.
, vol.8
, Issue.2
, pp. 598-607
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Xiao, C.5
-
17
-
-
84861631795
-
Location privacy preservation in collaborative spectrum sensing
-
S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, "Location privacy preservation in collaborative spectrum sensing," in Proc. IEEE INFOCOM, 2012, pp. 729-737.
-
(2012)
Proc. IEEE INFOCOM
, pp. 729-737
-
-
Li, S.1
Zhu, H.2
Gao, Z.3
Guan, X.4
Xing, K.5
Shen, X.6
-
18
-
-
84904437773
-
Achieving differential privacy of data disclosure in the smart grid
-
J. Zhao, T. Jung, Y. Wang, and X. Y. Li, "Achieving differential privacy of data disclosure in the smart grid," in Proc. IEEE INFOCOM, 2014, pp. 504-512.
-
(2014)
Proc. IEEE INFOCOM
, pp. 504-512
-
-
Zhao, J.1
Jung, T.2
Wang, Y.3
Li, X.Y.4
-
19
-
-
84946147511
-
-
Eprint Arxiv1502
-
Y. Michalevsky, G. Nakibly, A. Schulman, and D. Boneh, "Powerspy: Location tracking using mobile device power analysis," Eprint Arxiv1502, 2015.
-
(2015)
Powerspy: Location Tracking Using Mobile Device Power Analysis
-
-
Michalevsky, Y.1
Nakibly, G.2
Schulman, A.3
Boneh, D.4
-
20
-
-
84874622678
-
Supporting pattern-preserving anonymization for time-series data
-
Apr.
-
L. Shou, X. Shang, K. Chen, G. Chen, and C. Zhang, "Supporting pattern-preserving anonymization for time-series data," IEEE Trans. Knowl. Data Eng., vol. 25, no. 4, pp. 877-892, Apr. 2013.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.4
, pp. 877-892
-
-
Shou, L.1
Shang, X.2
Chen, K.3
Chen, G.4
Zhang, C.5
-
21
-
-
84891751231
-
A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud
-
Feb.
-
X. Zhang, L. T. Yang, C. Liu, and J. Chen, "A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 2, pp. 363-373, Feb. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.2
, pp. 363-373
-
-
Zhang, X.1
Yang, L.T.2
Liu, C.3
Chen, J.4
-
22
-
-
84987857721
-
Privacyassured aggregation protocol for smart metering: A proactive fault-tolerant approach
-
May
-
J. Won, C. Y. T. Ma, D. K. Y. Yau, and N. S. V. Rao, "Privacyassured aggregation protocol for smart metering: A proactive fault-tolerant approach," IEEE/ACM Trans. Netw., vol. PP, no. 99, pp. 1-14, May 2015.
-
(2015)
IEEE/ACM Trans. Netw.
, vol.PP
, Issue.99
, pp. 1-14
-
-
Won, J.1
Ma, C.Y.T.2
Yau, D.K.Y.3
Rao, N.S.V.4
-
23
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
K. Kursawe, G. Danezis, and M. Kohlweiss, "Privacy-friendly aggregation for the smart-grid," in Proc. PETS, 2011, pp. 175-191.
-
(2011)
Proc. PETS
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
24
-
-
84860860164
-
Do not snoop my habits: Preserving privacy in the smart grid
-
May
-
F. Mármol, C. Sorge, O. Ugus, and G. Pérez, "Do not snoop my habits: Preserving privacy in the smart grid," IEEE Commun. Mag., vol. 50, no. 5, pp. 166-172, May 2012.
-
(2012)
IEEE Commun. Mag.
, vol.50
, Issue.5
, pp. 166-172
-
-
Mármol, F.1
Sorge, C.2
Ugus, O.3
Pérez, G.4
-
25
-
-
74449085562
-
Privacy-preserving multiparty collaborative mining with geometric data perturbation
-
Dec.
-
K. Chen and L. Liu, "Privacy-preserving multiparty collaborative mining with geometric data perturbation," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 12, pp. 1764-1776, Dec. 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.12
, pp. 1764-1776
-
-
Chen, K.1
Liu, L.2
-
26
-
-
84865445591
-
A randomized response model for privacy preserving smart metering
-
Sep.
-
S. Wang, L. Cui, J. Que, D.-H. Choi, X. Jiang, S. Cheng, and X. Le, "A randomized response model for privacy preserving smart metering," IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1317-1324, Sep. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.3
, pp. 1317-1324
-
-
Wang, S.1
Cui, L.2
Que, J.3
Choi, D.-H.4
Jiang, X.5
Cheng, S.6
Le, X.7
-
27
-
-
84926658293
-
Time-series pattern based effective noise generation for privacy protection on cloud
-
May
-
G. Zhang, X. Liu, and Y. Yang, "Time-series pattern based effective noise generation for privacy protection on cloud," IEEE Trans. Comput., vol. 64, no. 5, pp. 1456-1469, May 2015.
-
(2015)
IEEE Trans. Comput.
, vol.64
, Issue.5
, pp. 1456-1469
-
-
Zhang, G.1
Liu, X.2
Yang, Y.3
-
29
-
-
84905991151
-
The algorithmic foundations of differential privacy
-
C. Dwork and A. Roth, "The algorithmic foundations of differential privacy," Found. Trends Theoretical Comput. Sci., vol. 9, no. 3, pp. 211-407, 2013.
-
(2013)
Found. Trends Theoretical Comput. Sci.
, vol.9
, Issue.3
, pp. 211-407
-
-
Dwork, C.1
Roth, A.2
-
30
-
-
84939815790
-
Evaluation of the precision-privacy tradeoff of data perturbation for smart metering
-
Sep.
-
M. Savi, C. Rottondi, and G. Verticale, "Evaluation of the precision-privacy tradeoff of data perturbation for smart metering," IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2409-2416, Sep. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.5
, pp. 2409-2416
-
-
Savi, M.1
Rottondi, C.2
Verticale, G.3
-
32
-
-
85008249087
-
Differential privacy in practice
-
H. H. Nguyen, J. Kim, and Y. Kim, "Differential privacy in practice," J. Comput. Sci. Eng., vol. 7, no. 3, pp. 177-186, 2013.
-
(2013)
J. Comput. Sci. Eng.
, vol.7
, Issue.3
, pp. 177-186
-
-
Nguyen, H.H.1
Kim, J.2
Kim, Y.3
-
34
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd Conf. Theory Cryptography, 2006, pp. 265-284.
-
(2006)
Proc. 3rd Conf. Theory Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
35
-
-
79953250055
-
Evaluating laplace noise addition to satisfy differential privacy for numeric data
-
R. Sarathy and K. Muralidhar, "Evaluating laplace noise addition to satisfy differential privacy for numeric data," Trans. Data Privacy, vol. 4, no. 1, pp. 1-17, 2011.
-
(2011)
Trans. Data Privacy
, vol.4
, Issue.1
, pp. 1-17
-
-
Sarathy, R.1
Muralidhar, K.2
-
36
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith, "Smooth sensitivity and sampling in private data analysis," in Proc. 39th Annu. ACM Symp. Theory Comput., 2007, pp. 75-84.
-
(2007)
Proc. 39th Annu. ACM Symp. Theory Comput.
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
37
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry, "Privacy integrated queries: An extensible platform for privacy-preserving data analysis," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 19-30.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 19-30
-
-
McSherry, F.D.1
-
39
-
-
77954717626
-
Differential privacy under continual observation
-
C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum, "Differential privacy under continual observation," in Proc. 42nd ACM Symp. Theory Comput., 2010, pp. 715-724.
-
(2010)
Proc. 42nd ACM Symp. Theory Comput.
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
-
40
-
-
84871605204
-
Universally utility-maximizing privacy mechanisms
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utility-maximizing privacy mechanisms," SIAM J. Comput., vol. 41, no. 6, pp. 1673-1693, 2012.
-
(2012)
SIAM J. Comput.
, vol.41
, Issue.6
, pp. 1673-1693
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
41
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," J. Am. Statist. Assoc., vol. 60, pp. 63-69, 1965.
-
(1965)
J. Am. Statist. Assoc.
, vol.60
, pp. 63-69
-
-
Warner, S.L.1
-
42
-
-
77955582902
-
Domestic electricity use: A high-resolution energy demand model
-
I. Richardson, M. Thomson, D. Infield, and C. Clifford, "Domestic electricity use: A high-resolution energy demand model," Energy Buildings, vol. 42, no. 10, pp. 1878-1887, 2010.
-
(2010)
Energy Buildings
, vol.42
, Issue.10
, pp. 1878-1887
-
-
Richardson, I.1
Thomson, M.2
Infield, D.3
Clifford, C.4
-
43
-
-
80052663001
-
Differentially private data release for data mining
-
N. Mohammed, R. Chen, B. Fung, and P. Yu, "Differentially private data release for data mining," in Proc. ACM SIGKDD, 2011, pp. 493-501.
-
(2011)
Proc. ACM SIGKDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.3
Yu, P.4
-
44
-
-
84907031418
-
A case study: Privacy preserving release of spatio-temporal density in Paris
-
G. Acs and C. Castelluccia, "A case study: Privacy preserving release of spatio-temporal density in paris," in Proc. ACM SIGKDD, 2014, pp. 1679-1688.
-
(2014)
Proc. ACM SIGKDD
, pp. 1679-1688
-
-
Acs, G.1
Castelluccia, C.2
-
45
-
-
84871966152
-
The exponential mechanism for social welfare: Private, truthful, and nearly optimal
-
Z. Huang and S. Kannan, "The exponential mechanism for social welfare: Private, truthful, and nearly optimal," in Proc. IEEE 53rd Annu. Symp. Found. Comput. Sci., 2012, pp. 140-149.
-
(2012)
Proc. IEEE 53rd Annu. Symp. Found. Comput. Sci.
, pp. 140-149
-
-
Huang, Z.1
Kannan, S.2
-
46
-
-
84878330331
-
Utility-privacy tradeoffs in databases: An information-theoretic approach
-
Jun.
-
L. Sankar, S. R. Rajagopalan, and H. V. Poor, "Utility-privacy tradeoffs in databases: An information-theoretic approach," IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 838-852, Jun. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.6
, pp. 838-852
-
-
Sankar, L.1
Rajagopalan, S.R.2
Poor, H.V.3
-
47
-
-
84883452406
-
Optimal data-independent noise for differential privacy
-
J. Soria-Comas and J. Domingo-Ferrer, "Optimal data-independent noise for differential privacy," Inf. Sci., vol. 250, no. 0, pp. 200-214, 2013.
-
(2013)
Inf. Sci.
, vol.250
, pp. 200-214
-
-
Soria-Comas, J.1
Domingo-Ferrer, J.2
-
49
-
-
84954556485
-
Differentially private data aggregation with optimal utility
-
F. Eigner, A. Kate, M. Maffei, F. Pampaloni, and I. Pryvalov, "Differentially private data aggregation with optimal utility," in Proc. IEEE 30th Annu. Comput. Security Appl. Conf., 2014, pp. 316-325.
-
(2014)
Proc. IEEE 30th Annu. Comput. Security Appl. Conf.
, pp. 316-325
-
-
Eigner, F.1
Kate, A.2
Maffei, M.3
Pampaloni, F.4
Pryvalov, I.5
-
50
-
-
84863951613
-
Differential privacy: On the trade-off between utility and information leakage
-
M. S. Alvim, E. Miguel, and A. Konstantinos, "Differential privacy: On the trade-off between utility and information leakage," in Proc. 8th Int. Workshop Formal Aspects Security Trust, 2012, vol. 7140, pp. 39-54.
-
(2012)
Proc. 8th Int. Workshop Formal Aspects Security Trust
, vol.7140
, pp. 39-54
-
-
Alvim, M.S.1
Miguel, E.2
Konstantinos, A.3
-
51
-
-
84920857531
-
Correlated differential privacy: Hiding information in non-iid data set
-
Feb.
-
T. Zhu, P. Xiong, G. Li, and W. Zhou, "Correlated differential privacy: Hiding information in non-iid data set," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 229-242, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 229-242
-
-
Zhu, T.1
Xiong, P.2
Li, G.3
Zhou, W.4
-
52
-
-
84881109383
-
Practical differential privacy via grouping and smoothing
-
G. Kellaris and S. Papadopoulos, "Practical differential privacy via grouping and smoothing," Proc. VLDB Endowment, vol. 6, no. 5, pp. 301-312, 2013.
-
(2013)
Proc. VLDB Endowment
, vol.6
, Issue.5
, pp. 301-312
-
-
Kellaris, G.1
Papadopoulos, S.2
-
54
-
-
84889037772
-
Geo-indistinguishability: Differential privacy for locationbased systems
-
M. E. Andrs, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Geo-indistinguishability: Differential privacy for locationbased systems," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 901-914.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 901-914
-
-
Andrs, M.E.1
Bordenabe, N.E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
55
-
-
84910685712
-
Rappor: Randomized aggregatable privacy-preserving ordinal response
-
U. Erlingsson, V. Pihur, and A. Korolova, "Rappor: Randomized aggregatable privacy-preserving ordinal response," in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2014, pp. 1054-1067.
-
(2014)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 1054-1067
-
-
Erlingsson, U.1
Pihur, V.2
Korolova, A.3
-
58
-
-
85011095699
-
Time series compressibility and privacy
-
S. Papadimitriou, F. Li, G. Kollios, and P. S. Yu, "Time series compressibility and privacy," in Proc. 33rd Int. Conf. Very Large Data Bases, 2007, pp. 459-470.
-
(2007)
Proc. 33rd Int. Conf. Very Large Data Bases
, pp. 459-470
-
-
Papadimitriou, S.1
Li, F.2
Kollios, G.3
Yu, P.S.4
-
59
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2010, pp. 735-746.
-
(2010)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
60
-
-
84947126453
-
The matrix mechanism: Optimizing linear counting queries under differential privacy
-
C. Li, G. Miklau, M. Hay, A. Mcgregor, and V. Rastogi, "The matrix mechanism: Optimizing linear counting queries under differential privacy," The VLDB J., vol. 24, no. 6, pp. 757-781, 2015.
-
(2015)
The VLDB J.
, vol.24
, Issue.6
, pp. 757-781
-
-
Li, C.1
Miklau, G.2
Hay, M.3
Mcgregor, A.4
Rastogi, V.5
-
61
-
-
80955157833
-
Compressive mechanism: Utilizing sparse representation in differential privacy
-
Y. D. Li, Z. Zhang, M. Winslett, and Y. Yang, "Compressive mechanism: Utilizing sparse representation in differential privacy," in Proc. 10th Annu. ACM Workshop Privacy Electron. Soc., 2011, pp. 177-182.
-
(2011)
Proc. 10th Annu. ACM Workshop Privacy Electron. Soc.
, pp. 177-182
-
-
Li, Y.D.1
Zhang, Z.2
Winslett, M.3
Yang, Y.4
-
62
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," Proc. VLDB Endowment, vol. 3, pp. 1021-1032, 2010.
-
(2010)
Proc. VLDB Endowment
, vol.3
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
63
-
-
79959540412
-
Differential privacy via wavelet transforms
-
Aug.
-
X. Xiao, G. Wang, and J. Gehrke, "Differential privacy via wavelet transforms," IEEE Trans. on Knowl. Data Eng., vol. 23, no. 8, pp. 1200-1214, Aug. 2011.
-
(2011)
IEEE Trans. on Knowl. Data Eng.
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
|