[1] L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, Vol. 10, No. 5, pp. 557-570, 2002 [2] A. Machanavajjhala, D. Kifer, J. Gehrke,M. Venkitasubramaniam, “L-Diversity: Privacy Beyond k-Anonymity,” in Proceedings of 22nd International Conference on Data Engineering (ICDE'06), pp. 24-24, 2006 [3] N. Li, T. Li,S. Venkatasubramanian.“t-Closeness: Privacy Beyond k-Anonymity and Diversity,” in Proceedings of 23rd International Conference on Data Engineering IEEE, pp. 106-115, 2007 [4] C. Dwork, “Differential Privacy,” LNCS 4052: Lecture Notes in Computer Science, pp.1-12, Springer, Berlin, 2006 [5] W. Qardaji, W. Yang,N. Li, “Differentially Private Grids for Geospatial Data,” in Proceedings of 29th International Conference on Data Engineering (ICDE), pp. 757-768, 2013 [6] X. J. Zhang, K. Z. Jin,X. F. Meng, “Private Spatial Decomposition with Adaptive Grid,” Journal of Computer Research and Development, Vol. 55, No. 6, pp. 29-42, 2018 [7] M. Hay, A. Machanavajjhala, G. Miklau, Y. Chen, and D. Zhang, “Principled Evaluation of Differentially Private Algorithms using Dpbench,” in Proceedings of the 2016 International Conference on Management of Data ACM, pp. 139-154, 2016 [8] J. Xu, Z. J. Zhang, X. K. Xiao, Y. Yang, G. Yu,M. Winslett, “Differentially Private Histogram Publication,” The VLDB Journal, Vol. 22, No. 6, pp. 797-822, 2013 [9] G. Cormode, C. Procopiuc, D. Srivastava,T. T. L.Tran, “Differentially Private Summaries for Sparse Data,” in Proceedings of International Conference on Database Theory ACM, pp. 299-311, 2012 [10] D. J. MIR, S. Isaacman, R. Cáceres, M. Martonosi,R. N. Wright, “Dp-Where: Differentially Private Modeling of Human Mobility,” in Proceedings of International Conference on Big Data, pp. 580-588, 2013 [11] G. Cormode, C. Procopiuc, D. Srivastava, E. Shen, and T. Yu, “Differentially Private Spatial Decompositions”, in Proceedings of the 2012 IEEE 28th International Conference on Data Engineering, pp. 20-31, 2012 [12] L. Y. Fan, L. Bonomi, L. Xiong,V. Sunderam, “Monitoring Web Browsing Behavior with Differential Privacy,” in Proceedings of the 23rd International Conference on World Wide Web, pp. 177-188, 2014 [13] J. Wang, S. B. Liu, Y. K. Li, H. Cao,M. J. Liu, “Differentially Private Spatial Decompositions for Geospatial Point Data,” China Communications, Vol. 13, No. 4, pp. 97-107, 2016 [14] J. Zhang, X. Xiao, and X. Xie, “Privtree: A Differentially Private Algorithm for Hierarchical Decompositions,” in Proceedings of the 2016 International Conference on Management of Data, pp. 155-170, 2016 [15] W. Qardaji, W. Yang,N. Li, “Understanding Hierarchical Methods for Differentially Private Histograms,” Proceedings of the VLDB Endowment, Vol. 6, No. 14, pp. 1954-1965, 2013 [16] H. To, G. Ghinita,C. Shahabi, “A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing,” Proceedings of the VLDB Endowment, Vol. 7, No. 10, pp. 919-930, 2014 |