2016
DOI: 10.1002/sec.1493
|View full text |Cite
|
Sign up to set email alerts
|

Publishing histograms with outliers under data differential privacy

Abstract: Histograms are important tools for data mining and analysis. Several differentially private publishing schemes for histograms have been proposed recently. Existing differentially private histogram publication schemes have shown that histogram reconstruction is a promising idea for the improvement of publication histograms' accuracy. However, none of these have properly considered the problem outliers in the original histogram, which can cause significant reconstruction errors. Based on the problem, the publica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
12
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
7

Relationship

5
2

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 15 publications
(21 reference statements)
1
12
0
Order By: Relevance
“…In Algorithm 2, is the privacy budget required for sorting, but since line (5) replaces the noisy count with the real count and outputs an approximate order of the true values, there is no impact on the published results, so the algorithm does not actually consume the privacy budget [47].…”
Section: Generalized Tramentioning
confidence: 99%
“…In Algorithm 2, is the privacy budget required for sorting, but since line (5) replaces the noisy count with the real count and outputs an approximate order of the true values, there is no impact on the published results, so the algorithm does not actually consume the privacy budget [47].…”
Section: Generalized Tramentioning
confidence: 99%
“…Differential privacy was quickly applied to the privacy protection of data publishing [23] based on fake data technology to achieve privacy protection by adding noise to the real dataset [24]. In data distribution, differential privacy can achieve different levels of privacy protection and data publishing accuracy by adjusting the privacy parameter .…”
Section: Related Workmentioning
confidence: 99%
“…(1) Static Path For a static link, an attacker can acquire the entire data stream f as long as it detects one of the transmission paths. Let a denote the number of links that are swept out in the s-scan, and the probability of success of the attacker is shown in Equation (1).…”
Section: Theoretical Analysismentioning
confidence: 99%
“…Since only one predictable route is selected, the intruder can easily find the route and attack it. The dynamic network can transfer attack surface irregularly [1][2], so that the attacker can neither acquire the information of the defender accurately nor guarantee the accessibility of attack packet transmission. It can effectively defend against node eavesdropping and DoS attacks.…”
Section: Introductionmentioning
confidence: 99%