Privacy via the Johnson-Lindenstrauss Transform
Journal of Privacy and Confidentiality, pp. 22013.
Abstract:
Suppose that party A collects private information about its users, where each user\u0027s data is represented as a bit vector. Suppose that party B has a proprietary data mining algorithm that requires estimating the distance between users, such as clustering or nearest neighbors. We ask if it is possible for party A to publish some infor...More
Code:
Data:
Upload PDF
1.Your uploaded documents will be check within 24h, and coins will be credited to your account.
2.As the current system does not support cash withdrawal, you can add staff WeChat (AMxiaomai) to receive it as a red packet.
3.10 coins will be exchanged for 1 yuan.
?
¥
Upload a single paper
for 5 coins
Wechat's Red Packet
?
¥
Upload 50 articles
for 250 coins
Wechat's Red Packet
?
¥
Upload 200 articles
for 1000 coins
Wechat's Red Packet
?
¥
Upload 500 articles
for 2500 coins
Wechat's Red Packet
?
¥
Upload 1000 articles
for 5000 coins
Wechat's Red Packet
Tags
Comments