[1] Sei Y,Ohsuga A.Differential private data collection and analysis based on randomized multiple dummies for untrusted mobile crowdsensing[J].IEEE Transactions on Information Forensics and Security,2017,12(4):926-939.
[2] Zhang L,Mu Y,Wu Q.Compact Anonymous hierarchical identity-based encryption with constant size private keys:table 1[J].The Computer Journal,2016,59(4):452-461.
[3] Liu P,Hu C,Guo S,et al.Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application[J].International Journal of High Performance Computing and Networking,2017,10(3):226-239.
[4] 杨静,王超,张健沛.基于敏感属性熵的微聚集算法[J].电子学报,2014,42(7):1327-1337. YANG Jing,WANG Chao,ZHANG Jianpei.Micro-aggregation algorithm based on sensitive attribute entropy[J].Acta Electronica Sinica,2014,42(7):1327-1337.(in Chinese)
[5] Guo L,Ying X,Wu X.On Attribute Disclosure in randomization based privacy preserving data publishing[A].Proceedings of the International Conference on Data Mining Workshops[C].Sydney,Australia:IEEE,2010.466-473.
[6] Holohan N,Leith D J,Mason O.Optimal differentially private mechanisms for randomised response[J].IEEE Transactions on InformationForensics & Security,2017,12(11):2726-2735.
[7] Xiao X,Tao Y,Chen M.Optimal random perturbation at multiple privacy levels[J].Proceedings of the VLDB Endowment VLDB Endowment Hompage archive,2010,2(1):814-825.
[8] Nayak T K,Zhang C,You J,et al.Measuring identification risk in microdata release and its control by post-randomisation[J].International Statistical Review,2018,86(2):300-321.
[9] Ardo V D H,Kooiman P.Estimating the linear regression model with categorical covariates subject to randomized response[J].Computational Statistics & Data Analysis,2006,50(11):3311-3323.
[10] Nayak T K,Adeshiyan S A.On invariant post-randomization for statistical disclosure control[J].International Statistical Review,2016,84(1):26-42.
[11] Wang K,Han C,Fu A W.Randomization resilient to sensitive reconstruction[J].Annals of Internal Medicine,2012,158(2):397-403.
[12] Geng Q,Kairouz P,Oh S,et al.The staircase mechanism in differential privacy[J].IEEE Journal of Selected Topics in Signal Processing,2013,9(7):1176-1184. |