The following publications are possibly variants of this publication:
- Effective truth discovery under local differential privacy by leveraging noise-aware probabilistic estimation and fusionPengfei Zhang, Xiang Cheng, Sen Su, Ning Wang. kbs, 261:110213, 2023. [doi]
- A Hierarchical-based Frequent Itemset Mining Method under Local Differential PrivacyDeming Kong, Jian Wang. icbase 2022: 67-75 [doi]
- Hadamard Encoding Based Frequent Itemset Mining under Local Differential PrivacyDan Zhao, Suyun Zhao, Hong Chen 0001, Ruixuan Liu, Cui-Ping Li 0001, Xiaoying Zhang. jcst, 38(6):1403-1422, December 2023. [doi]
- PrivNUD: Effective Range Query Processing under Local Differential PrivacyNing Wang, Yaohua Wang, Zhigang Wang 0001, Jie Nie, Zhiqiang Wei 0002, Peng Tang, Yu Gu, Ge Yu 0001. icde 2023: 2660-2672 [doi]
- An effective scheme for top-k frequent itemset mining under differential privacy conditionsWenJuan Liang, Hong Chen 0001, Jing Zhang, Dan Zhao, Cuiping Li. chinaf, 63(5), 2020. [doi]
- Frequent Trajectory Mining with Local Differential PrivacyYaqian Huang, Huiwei Wang. icaci 2023: 1-6 [doi]
- Local differential privacy-based frequent sequence miningTeng Wang, Zhi Hu. jksucis, 34(Issue):3591-3601, 2022. [doi]
- Mining frequent items from high-dimensional set-valued data under local differential privacy protectionHaonan Wu, Ruisheng Ran, Shunshun Peng, Mengmeng Yang, Taolin Guo. eswa, 234:121105, December 2023. [doi]