Data mining with differential privacy
- 25 July 2010
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 493-502
- https://doi.org/10.1145/1835804.1835868
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- Privacy integrated queriesPublished by Association for Computing Machinery (ACM) ,2009
- What Can We Learn Privately?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Composition attacks and auxiliary information in data privacyPublished by Association for Computing Machinery (ACM) ,2008
- New Efficient Attacks on Statistical Disclosure Control MechanismsLecture Notes in Computer Science, 2008
- A learning theory approach to non-interactive database privacyPublished by Association for Computing Machinery (ACM) ,2008
- Privacy: Theory meets Practice on the MapPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Differential PrivacyLecture Notes in Computer Science, 2006
- Calibrating Noise to Sensitivity in Private Data AnalysisLecture Notes in Computer Science, 2006
- Practical privacyPublished by Association for Computing Machinery (ACM) ,2005
- Mining high-speed data streamsPublished by Association for Computing Machinery (ACM) ,2000