共 30 条
[2]
[Anonymous], 2013, Proceedings of the 2013 ACM SIGSAC conference on Computer communications security
[3]
Backstrom L, 2012, PROCEEDINGS OF THE 3RD ANNUAL ACM WEB SCIENCE CONFERENCE, 2012, P33
[4]
Berlioz A., 2015, P 9 ACM C REC SYST R, P107, DOI DOI 10.1145/2792838.2800173
[5]
Beye M., 2013, SOCIAL MEDIA RETRIEV, P263
[6]
Bhaskar R, 2011, LECT NOTES COMPUT SC, V7073, P215, DOI 10.1007/978-3-642-25385-0_12
[7]
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[8]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]
Brakerski Z, 2011, LECT NOTES COMPUT SC, V6841, P505, DOI 10.1007/978-3-642-22792-9_29
[10]
"You Might Also Like:" Privacy Risks of Collaborative Filtering
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:231-246