2016 Annual Conference on Information Science and Systems (CISS) 2016
DOI: 10.1109/ciss.2016.7460487
|View full text |Cite
|
Sign up to set email alerts
|

Differential privacy in networked data collection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…[15], [16]. Mutual information based privacy metrics have also been considered for data streaming applications [17]- [19]. Wang et al [20] compare mutual information privacy with differential privacy under Hamming distortion.…”
Section: B Related Workmentioning
confidence: 99%
“…[15], [16]. Mutual information based privacy metrics have also been considered for data streaming applications [17]- [19]. Wang et al [20] compare mutual information privacy with differential privacy under Hamming distortion.…”
Section: B Related Workmentioning
confidence: 99%
“…DynaEgo utilizes the principle of DP as well as the social relationships to adaptively modify the users' rating histories to prevent exact user information from being leaked. Javidbakht and Venkitasubramaniam [18] proposed using DP as a metric to quantify the privacy of the intended destination, and optimal probabilistic routing schemes are investigated under unicast and multicast paradigms. Balu and Furon [19] proposed using sketching techniques to implicitly provide DP guarantees by taking advantage of the inherent randomness of the data structure, and this approach is well suited for large-scale applications.…”
Section: Related Workmentioning
confidence: 99%