[1] DWORK C. Differential privacy[C]//Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming,LNCS 4052. Berlin:Springer,2006:1-12. [2] HAY M,RASTOGI V,MIKLAU G,et al. Boosting the accuracy of differentially private histograms through consistency[J]. Proceedings of the VLDB Endowment,2010,3(1/2):1021-1032. [3] XIAO X,WANG G,GEHRKE J. Differential privacy via wavelet transforms[J]. IEEE Transactions on Knowledge and Data Engineering,2011,23(8):1200-1214. [4] CORMODE G, PROCOPIUC C, SRIVASTAVA D, et al. Differentially private spatial decompositions[C]//Proceedings of the IEEE 28th International Conference on Data Engineering. Piscataway:IEEE,2012:20-31. [5] ACS G, CASTELLUCCIA C, CHEN R. Differentially private histogram publishing through lossycompression[C]//Proceedings of the IEEE 12th International Conference on Data Mining. Piscataway:IEEE,2012:1-10. [6] XU J,ZHANG Z,XIAO X,et al. Differentially private histogram publication[J]. VLDB Journal,2013,22(6):797-822. [7] KELLARIS G,PAPADOPOULOS S. Practical differential privacy via grouping and smoothing[J]. Proceedings of the VLDB Endowment,2013,6(5):301-312. [8] 张啸剑, 邵超, 孟小峰. 差分隐私下一种精确直方图发布方法[J]. 计算机研究与发展,2016,53(5):1106-1117.(ZHANG X J, SHAO C, MENG X F. Accurate histogram release under differential privacy[J]. Journal of Computer Research and Development,2016,53(5):1106-1117.) [9] ZHANG X,CHEN R,XU J,et al. Towards accurate histogram publication under differential privacy[C]//Proceedings of the 2014 SIAM International Conference on Data Mining. Philadelphia,PA:SIAM,2014:587-595. [10] QARDAJI W, YANG W, LI N. Understanding hierarchical methods for differentially private histograms[J]. Proceedings of the VLDB Endowment,2013,6(14):1954-1965. [11] HAN Q,SHAO B,LI L,et al. Publishing histograms with outliers under data differential privacy[J]. Security and Communication Networks,2016,9(14):2313-2322. [12] LI H,XIONG L,JIANG X. Differentially private histogram and synthetic data publication[M]//GKOULALAS-DIVANIS A, LOUKIDES G. Medical Data Privacy Handbook. Cham:Springer,2015:35-58. [13] LI C,HAY M,RASTOGI V,et al. Optimizing linear counting queries under differential privacy[C]//Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. New York:ACM,2010:123-134. [14] DOUDALIS S, MEHROTRA S. SORTaki:a framework to integrate sorting with differential private histogramming algorithms[C]//Proceedings of the 15th Annual Conference on Privacy, Security and Trust. Piscataway:IEEE,2017:9500-9509. [15] 杨旭东, 高岭, 王海, 等. 一种面向直方图发布的均衡差分隐私保护方法[J]. 计算机学报,2020,43(8):1414-1432.(YANG X D,GAO L,WANG H,et al. Balanced correlation differential privacy protection method for histogram publishing[J]. Chinese Journal of Computers,2020,43(8):1414-1432.) [16] LI H,CUI J,MENG X,et al. IHP:improving the utility in differential private histogram publication[J]. Distributed and Parallel Databases,2019,37(4):721-750. [17] 张啸剑, 王淼, 孟小峰. 差分隐私保护下一种精确挖掘top-k频繁模式方法[J]. 计算机研究与发展,2014,51(1):104-114. (ZHANG X J,WANG M,MENG X F. An accurate method for mining top-k frequent pattern under differential privacy[J]. Journal of Computer Research and Development,2014,51(1):104-114.) |