Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise |
Liu, Hai
(School of Computer Science, Shaanxi Normal University)
Wu, Zhenqiang (School of Computer Science, Shaanxi Normal University) Peng, Changgen (Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University) Tian, Feng (School of Computer Science, Shaanxi Normal University) Lu, Laifeng (School of Mathematics and Information Science, Shaanxi Normal University) |
1 | Jiaqi Zhang, Kai Zheng, Wenlong Mou and Liwei Wang, "Efficient private ERM for smooth objectives," in Proc. of Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, pp. 3922-3928, August 19-25, 2017. |
2 | Frank McSherry and Ilya Mironov, "Differentially private recommender systems: Building privacy into the net," in Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627-636, June 28-July 1, 2009. |
3 | Wei Tong, Jingyu Hua and Sheng Zhong, "A jointly differentially private scheduling protocol for ridesharing services," IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2444-2456, October, 2017. DOI |
4 | Jing Yuan, Yu Zheng, Xing Xie and Guangzhong Sun, "Driving with knowledge from the physical world," in Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 316-324, August 21-24, 2011. |
5 | Cynthia Dwork and Aaron Roth, "The algorithmic foundations of differential privacy," Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211-407, August, 2014. |
6 | Martin Enserink and Gilbert Chin, "The end of privacy," Science, vol. 347, no. 6221, pp. 490-491, January, 2015. DOI |
7 | Cynthia Dwork, Frank McSherry, Kobbi Nissim and Adam Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. of Theory of Cryptography Conference, pp. 265-284, March 4-7, 2006. |
8 | Chi Lin, Zihao Song, Qing Liu, Weifeng Sun and Guowei Wu, "Protecting privacy for big data in body sensor networks: A differential privacy approach," in Proc. of International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 163-172, November 10-11, 2015. |
9 | Kendrick Boyd, Eric Lantz and David Page, "Differential privacy for classifier evaluation," in Proc. of the 8th ACM Workshop on Artificial Intelligence and Security, pp. 15-23, October 16, 2015. |
10 | Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov and Moni Naor, "Our data, ourselves: Privacy via distributed noise generation," in Proc. of Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486-503, May 28-June 1, 2006. |
11 | Daniel L. Goroff, "Balancing privacy versus accuracy in research protocols," Science, vol. 347, no. 6221, pp. 479-480, January 2015. DOI |
12 | Suan Landau, "Control use of data to protect privacy," Science, vol. 347, no. 6221, pp. 504-506, January, 2015. DOI |
13 | Jerome Le Ny and George J. Pappas, "Differentially private filtering," IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341-354, September, 2013. DOI |
14 | Zach Jorgensen, Ting Yu and Graham Cormode, "Conservative or liberal? Personalized differential privacy," in Proc. of 2015 IEEE 31st International Conference on Data Engineering, pp. 1023-1034, April 13-17, 2015. |
15 | Cynthia Dwork, Kunal Talwar, Abhradeep Thakurta and Li Zhang, "Analyze gauss: Optimal bounds for privacy preserving principal component analysis," in Proc. of Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing, pp. 11-20, May 31-June 3, 2014. |
16 | Jordi Soria-Comas, Josep Domingo-Ferrer, David Sanchez and David Megias, "Individual differential privacy: A utility-preserving formulation of differential privacy guarantees," IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1418-1429, June, 2017. DOI |
17 | Yining Wang and Animashree Anandkumar, "Online and differentially-private tensor decomposition," in Proc. of Advances in Neural Information Processing Systems, pp. 3531-3539, December 5-10, 2016. |
18 | Moritz Hardt and Aaron Roth, "Beating randomized response on incoherent matrices," in Proc. of Proceedings of the Forty-Fourth Annual ACM Aymposium on Theory of Computing, pp.1255-1268, May 19-22, 2012. |
19 | Aleksandar Nikolov, Kunal Talwar and Li Zhang, "The geometry of differential privacy: The sparse and approximate cases," in Proc. of the Forty-fifth Annual ACM Aymposium on Theory of Computing, pp. 351-360, June 1-4, 2013. |
20 | Chao Li, Gerome Miklau, Michael Hay, Andrew McGregor and Vibhor Rastogi, "The matrix mechanism: Optimizing linear counting queries under differential privacy," The VLDB Journal, vol. 24, no. 6, pp. 757-781, December, 2015. DOI |
21 | Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendar McMahan, Ilya Mironov, Kunal Talwar and Li Zheng, "Deep learning with differential privacy," in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308-318, October 24-28, 2016. |