2020 IEEE 10th International Conference on Electronics Information and Emergency Communication (ICEIEC) 2020
DOI: 10.1109/iceiec49280.2020.9152248
|View full text |Cite
|
Sign up to set email alerts
|

Frequent Itemset Mining with Hadamard Response Under Local Differential Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…Differential privacy [2], [16], [17], [19], as a rigorous privacy protection model, has attracted a lot of attention, since it can provide theoretical privacy guarantee against adversaries with arbitrary background information. Before introducing the definition of differential privacy, we first give the definition of neighboring database in the following.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Differential privacy [2], [16], [17], [19], as a rigorous privacy protection model, has attracted a lot of attention, since it can provide theoretical privacy guarantee against adversaries with arbitrary background information. Before introducing the definition of differential privacy, we first give the definition of neighboring database in the following.…”
Section: Related Workmentioning
confidence: 99%
“…Definition 2 (ε-DP [20]): Given a randomized algorithm A, A satisfies ε-DP if for any two neighboring databases D 1 and D 2 , and any output O of A, there exists [17], [19] have been devoted to publishing statistics for high-dimensional data. Existing works can be classified into three categories.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…So far, many traditional data mining algorithms have been extended to satisfy differential privacy, e.g. k-means [11], k-nearest neighbour classification [12], random forest [13], frequent itemset mining [14,15] and so on. Nevertheless, when focusing on spectral clustering, there are few works with regard to differentially private spectral clustering algorithms.…”
Section: Introductionmentioning
confidence: 99%