[1] Dwork C.Differential privacy[A].International Colloquium on Automata,Languages,and Programming[C].Berlin,Heidelberg:Springer,2006.1-12.
[2] Dwork C,Mcsherry F,Nissim K,et al.Calibrating noise to sensitivity in private data analysis[J].Lecture Notes in Computer Science,2006,3876(8):265-284.
[3] Sankar L,Rajagopalan S R,Poor H V.Utility-privacy tradeoffs in databases:An information-theoretic approach[J].IEEE Transactions on Information Forensics & Security,2013,8(6):838-852.
[4] Kalantari K,Sankar L,Sarwate A D.Robust privacy-utility tradeoffs under differential privacy and hamming distortion[J].IEEE Transactions on Information Forensics and Security,2018,13(11):2816-2830.
[5] Alvim MS,Chatzikokolakis K,Degano P,Palamidessi C.Differential privacy versus quantitative information flow[R].Technical Report,2010.
[6] Barthe G,Kopf B.Information-theoretic bounds for differentially private mechanisms[A].Computer Security Foundations Symposium[C].IEEE,2011.191-204.
[7] Pin Calmon F D,Fawaz N.Privacy against statistical inference[A].Proceedings of 50th Annual Allerton Conference on Communication,Control,and Computing[C].Monticello IL,USA,2012.1401-1408.
[8] Darakhshan J Mir.Information-Theoretic Foundations of Differential Privacy[M].Foundations and Practice of Security.Berlin Heidelberg:Springer,2013.374-381.
[9] Alvim M S,Andrés M E,Chatzikokolakis K,et al.On the information leakage of differentially-private mechanisms[J].Journal of Computer Security,2015,23(4):427-469.
[10] 彭长根,丁红发,朱义杰,田有亮,符祖峰.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903. Peng C G,Ding H F,ZHU Y J,Tian Y L,Fu Z F.Information entropy models and privacy metrics methods for privacy protection[J].Journal of Software,2016,27(8):1891-1903.(in Chinese)
[11] Wang W,Ying L,Zhang J.On therelation between identifiability,differential privacy,and mutual-information privacy[J].IEEE Transactions on Information Theory,2016,62(9):5018-5029.
[12] Cuff P,Yu L.Differentialprivacy as a mutual information constraint[A].ACM SIGSAC Conference on Computer and Communications Security[C].New York,NY,USA,2016.43-54.
[13] Alvim M S,Andrés M E,Chatzikokolakis K,et al.Differentialprivacy:On the trade-off between utility and information leakage[A].International Workshop on Formal Aspects in Security and Trust[C].Berlin,Heidelberg:Springer,2012.39-54.
[14] Shannon C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423.
[15] Reshef D N,Reshef Y A,Finucane H K,et al.Detecting novel associations in large data sets[J].Science,2011,334(6062):1518-1524.
[16] 梁吉业,冯晨娇,宋鹏.大数据相关分析综述[J].计算机学报,2016,39(1):1-18. Liang Ji-ye,Feng Chen-jiao,Song Peng.Asurvey on correlation analysis of big data[J].Chinese Journal of Computers,2016,39(1):1-18.(in Chinese) |