Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on local differential privacy toward data statistics and analysis
T Wang, X Zhang, J Feng, X Yang - Sensors, 2020 - mdpi.com
Collecting and analyzing massive data generated from smart devices have become
increasingly pervasive in crowdsensing, which are the building blocks for data-driven …
increasingly pervasive in crowdsensing, which are the building blocks for data-driven …
A comprehensive survey on local differential privacy
X **ong, S Liu, D Li, Z Cai, X Niu - Security and Communication …, 2020 - Wiley Online Library
With the advent of the era of big data, privacy issues have been becoming a hot topic in
public. Local differential privacy (LDP) is a state‐of‐the‐art privacy preservation technique …
public. Local differential privacy (LDP) is a state‐of‐the‐art privacy preservation technique …
Manipulation attacks in local differential privacy
Local differential privacy is a widely studied restriction on distributed algorithms that collect
aggregates about sensitive user data, and is now deployed in several large systems. We …
aggregates about sensitive user data, and is now deployed in several large systems. We …
On the power of multiple anonymous messages: Frequency estimation and selection in the shuffle model of differential privacy
It is well-known that general secure multi-party computation can in principle be applied to
implement differentially private mechanisms over distributed data with utility matching the …
implement differentially private mechanisms over distributed data with utility matching the …
Differentially private assouad, fano, and le cam
Abstract Le Cam's method, Fano's inequality, and Assouad's lemma are three widely used
techniques to prove lower bounds for statistical estimation tasks. We propose their …
techniques to prove lower bounds for statistical estimation tasks. We propose their …
The role of interactivity in local differential privacy
We study the power of interactivity in local differential privacy. First, we focus on the
difference between fully interactive and sequentially interactive protocols. Sequentially …
difference between fully interactive and sequentially interactive protocols. Sequentially …
Inference under information constraints I: Lower bounds from chi-square contraction
Multiple players are each given one independent sample, about which they can only provide
limited information to a central referee. Each player is allowed to describe its observed …
limited information to a central referee. Each player is allowed to describe its observed …
The structure of optimal private tests for simple hypotheses
Hypothesis testing plays a central role in statistical inference, and is used in many settings
where privacy concerns are paramount. This work answers a basic question about privately …
where privacy concerns are paramount. This work answers a basic question about privately …
Advancing differential privacy: Where we are now and future directions for real-world deployment
In this article, we present a detailed review of current practices and state-of-the-art
methodologies in the field of differential privacy (DP), with a focus of advancing DP's …
methodologies in the field of differential privacy (DP), with a focus of advancing DP's …
Differentially private testing of identity and closeness of discrete distributions
We study the fundamental problems of identity testing (goodness of fit), and closeness
testing (two sample test) of distributions over $ k $ elements, under differential privacy. While …
testing (two sample test) of distributions over $ k $ elements, under differential privacy. While …