K Huang, G Ouyang, Q Ye, H Hu… - … on Knowledge and …, 2024 - ieeexplore.ieee.org
The protocols that satisfy Local Differential Privacy (LDP) enable untrusted third parties to collect aggregate information about a population without disclosing each user's privacy. In …
R Du, Q Ye, Y Fu, H Hu, J Li, C Fang… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
Local Differential Privacy (LDP) is now widely adopted in large-scale systems to collect and analyze sensitive data while preserving users' privacy. However, almost all LDP protocols …
The private collection of multiple statistics from a population is a fundamental statistical problem. One possible approach to realize this is to rely on the local model of differential …
Local differential privacy (LDP), which enables an untrusted server to collect aggregated statistics from distributed users while protecting the privacy of those users, has been widely …
S Song, L Xu, L Zhu - IEEE Transactions on Information …, 2023 - ieeexplore.ieee.org
Local differential privacy (LDP) is a promising technique to realize privacy-preserving data aggregation without a trusted aggregator. Normally, an LDP protocol requires each user to …
Local differential privacy (LDP) has been widely used to collect sensitive data from distributed users while preserving individual privacy. However, very recent studies show that …
The rise in IoT-driven distributed data analytics, coupled with increasing privacy concerns, has led to a demand for effective privacy-preserving and federated data collection/model …
W Tong, H Chen, J Niu, S Zhong - arXiv preprint arXiv:2406.19466, 2024 - arxiv.org
Local differential privacy (LDP) provides a way for an untrusted data collector to aggregate users' data without violating their privacy. Various privacy-preserving data analysis tasks …
Y Fu, Q Ye, R Du, H Hu - arXiv preprint arXiv:2403.10313, 2024 - arxiv.org
With the exponential growth of data and its crucial impact on our lives and decision-making, the integrity of data has become a significant concern. Malicious data poisoning attacks …