Related references
Note: Only part of the references are listed.Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning
Tao Zhang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Efficient privacy-preserving classification construction model with differential privacy technology
Lin Zhang et al.
JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS (2017)
CTS-DP: Publishing correlated time-series data via differential privacy
Hao Wang et al.
KNOWLEDGE-BASED SYSTEMS (2017)
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
Jie Lin et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
The Optimal Noise-Adding Mechanism in Differential Privacy
Quan Geng et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2016)
On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems
Xinyu Yang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)
FakeMask: A Novel Privacy Preserving Approach for Smartphones
Lichen Zhang et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)
Edge Computing: Vision and Challenges
Weisong Shi et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
FakeMask: A Novel Privacy Preserving Approach for Smartphones
Lichen Zhang et al.
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)
A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures
Zhijiang Chen et al.
BIG DATA RESEARCH (2016)
Differential Privacy in the Wild: A tutorial on current practices & open challenges
Ashwin Machanavajjhala et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2016)
Differential Privacy of Big Data: An Overview
Xiaoming Yao et al.
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2016)
INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems
Haiming Jin et al.
MOBIHOC '16: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (2016)
The Complexity of Computing the Optimal Composition of Differential Privacy
Jack Murtagh et al.
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I (2016)
Optimizing Batch Linear Queries under Exact and Approximate Differential Privacy
Ganzhao Yuan et al.
ACM TRANSACTIONS ON DATABASE SYSTEMS (2015)
A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems
Xinyu Yang et al.
COMPUTER NETWORKS (2015)
De-Anonymizing and Countermeasures in Anonymous Communication Networks
Ming Yang et al.
IEEE COMMUNICATIONS MAGAZINE (2015)
Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud
Gaofeng Zhang et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Correlated Differential Privacy: Hiding Information in Non-IID Data Set
Tianqing Zhu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
Jinguang Han et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
A Review of Differential Privacy in Individual Data Release
Jun Wang et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)
The matrix mechanism: optimizing linear counting queries under differential privacy
Chao Li et al.
VLDB JOURNAL (2015)
A Review of Differential Privacy in Individual Data Release
Jun Wang et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)
The internet of things: a survey
Shancang Li et al.
INFORMATION SYSTEMS FRONTIERS (2015)
Differentially Private High-Dimensional Data Publication via Sampling-Based Inference
Rui Chen et al.
KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2015)
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Qinghua Li et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)
An Adaptive Approach to Real-Time Aggregate Monitoring with Differential Privacy
Liyue Fan et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)
Data Mining with Big Data
Xindong Wu et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
Xuyun Zhang et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
Differentially Private Event Sequences over Infinite Streams
Georgios Kellaris et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2014)
Supporting Pattern-Preserving Anonymization for Time-Series Data
Lidan Shou et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)
Optimal data-independent noise for differential privacy
Jordi Soria-Comas et al.
INFORMATION SCIENCES (2013)
Unique in the Crowd: The privacy bounds of human mobility
Yves-Alexandre de Montjoye et al.
SCIENTIFIC REPORTS (2013)
Practical Differential Privacy via Grouping and Smoothing
Georgios Kellaris et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2013)
The Algorithmic Foundations of Differential Privacy
Cynthia Dwork et al.
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)
Understanding Hierarchical Methods for Differentially Private Histograms
Wahbeh Qardaji et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2013)
A context-aware scheme for privacy-preserving location-based services
Aniket Pingley et al.
COMPUTER NETWORKS (2012)
Publishing Search Logs-A Comparative Study of Privacy Guarantees
Michaela Goetz et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)
The Digital Marauder's Map: A WiFi Forensic Positioning Tool
Xinwen Fu et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)
A New Cell-Counting-Based Attack Against Tor
Zhen Ling et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
UNIVERSALLY UTILITY-MAXIMIZING PRIVACY MECHANISMS
Arpita Ghosh et al.
SIAM JOURNAL ON COMPUTING (2012)
An Adaptive Mechanism for Accurate Query Answering under Differential Privacy
Chao Li et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2012)
Differentially Private Spatial Decompositions
Graham Cormode et al.
2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE) (2012)
Differentially Private Histogram Publishing through Lossy Compression
Gergely Acs et al.
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012) (2012)
PDA: Privacy-Preserving Data Aggregation for Information Collection
Wenbo He et al.
ACM TRANSACTIONS ON SENSOR NETWORKS (2011)
Differential Privacy via Wavelet Transforms
Xiaokui Xiao et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)
A survey on privacy in mobile participatory sensing applications
Delphine Christin et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2011)
Privacy-Preserving Data Publishing: A Survey of Recent Developments
Benjamin C. M. Fung et al.
ACM COMPUTING SURVEYS (2010)
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures
Wei Yu et al.
IEEE TRANSACTIONS ON COMPUTERS (2010)
Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation
Keke Chen et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)
An Invisible Localization Attack to Internet Threat Monitors
Wei Yu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)
Calibrating noise to sensitivity in private data analysis
Cynthia Dwork et al.
THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)