[1] DWORK C. Differential privacy [C]// Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, LNCS 4052. Berlin: Springer, 2006: 1-12. [2] SWEENEY L. k-Anonymity: a model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570. [3] MACHANAVAJJHALA A, GEHRKE J, KIFER D, et al. L-diversity: privacy beyond k-anonymity [C]// Proceedings of the 22nd International Conference on Data Engineering. Washington, DC: IEEE Computer Society, 2006: 24-35. [4] DWORK C. Differential privacy in new settings [C]// Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia: Society for Industrial and Applied Mathematics, 2010: 174-183. [5] DWORK C, NAOR M, PITASSI T, et al. Differential privacy under continual observation [C]// Proceedings of the Forty-Second ACM Symposium on Theory of Computing. New York: ACM, 2010: 715-724. [6] DWORK C, NAOR M, PITASSI T, et al. Pan-private streaming algorithms [C]// Proceedings of the First Symposium on Innovations in Computer Science. Beijing: Tsinghua University Press, 2010: 66-80. [7] CHAN H T H, SHI E, SONG D. Private and continual release of statistics [C]// Proceedings of the 37th International Colloquium on Automata, Languages and Programming, LNCS 6199. Berlin: Springer, 2010: 405-417. [8] CAO J, XIAO Q, GHINITA G, et al. Efficient and accurate strategies for differentially-private sliding window queries [C]// Proceedings of the 16th International Conference on Extending Database Technology. New York: ACM, 2013: 191-202. [9] SHI E, CHAN H T H, RIEFFEL E G, et al. Privacy-preserving aggregation of time-series data [EB/OL]. [2014-05-28]. https://www.cs.umd.edu/~elaine/docs/ndss2011.pdf. [10] CHAN H T H, LI M, SHI E, et al. Differentially private continual monitoring of heavy hitters from distributed streams [C]// Proceedings of the 12th International Conference on Privacy Enhancing Technologies, LNCS 7384. Berlin: Springer, 2012: 140-159. [11] FAN L, XIONG L. An adaptive approach to real-time aggregate monitoring with differential privacy [J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 26(9): 2094-2106. [12] FAN L, XIONG L. Real-time aggregate monitoring with differential privacy [C]// Proceedings of the 21st ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 2169-2173. [13] NY J L, PAPPAS G J. Differentially private Kalman filtering [C]// Proceedings of 2012 50th Annual Allerton Conference on Communication, Control and Computing. Piscataway: IEEE, 2012: 1618-1625. [14] FAN L, XIONG L. Differentially private anomaly detection with a case study on epidemic outbreak detection [C]// Proceedings of the 2013 IEEE 13th International Conference on Data Mining Workshops. Piscataway: IEEE, 2013: 833-840. [15] GEHRKE J, KORN F, SRIVASTAVA D. On computing correlated aggregates over continual data stream [C]// Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2001: 13-14. [16] McSHERRY F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis [C]// Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2009: 19-30. [17] BABCOCK B, BABU S, DATAR M, et al. Models and issues in data stream systems [C]// Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. New York: ACM, 2002: 1-16. |