期刊文献+

基于差分隐私度序列的Thurstone模型中参数估计量的渐近性理论 被引量:1

Asymptotic theory of parameter estimators in Thurstone model based on differential privacy sequence
下载PDF
导出
摘要 Thurstone模型主要用于研究成对数据比较问题的统计模型,该模型在心理测量、社交选择、推荐系统等方面有着广泛的应用.然而,由于心理学研究中常常获取包含着个人隐私的数据,直接将数据发布进行分析会带来隐私泄露的风险.为解决数据隐私泄露问题,通过对原始数据加入离散Laplace噪声进行加密,然后利用数理统计方法建立了带有噪声的Thurstone模型参数的渐近性理论.最后通过数值模拟验证了理论结果. Thurstone model is a statistical model mainly used to study the comparison of paired data,it is widely used in psychological measurement,social choice,recommendation system and so on However,because psychological research often obtains data containing personal privacy,publishing and analyzing the data directly will bring the risk of privacy disclosure.In order to solve the problem of data privacy disclosure,this paper encrypts the original data by adding discrete Laplace noise,and then establishes the asymptotic theory of the parameters of Thurstone model with noise by using the method of mathematical statistics Finally,the theoretical results are verified by numerical simulation.
作者 胡军浩 马晓慧 罗敬 HU Junhao;MA Xiaohui;LUO Jing(College of Mathematics and Statistics,South-Central Minzu University,Wuhan 430074,China)
出处 《中南民族大学学报(自然科学版)》 CAS 北大核心 2022年第5期623-629,共7页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 中央高校基本科研业务费专项资金资助项目(CZQ22003) 中南民族大学研究生学术创新基金资助项目(3212022sycxjj005)。
关键词 Thurstone模型 相合性 渐近正态性 差分隐私 Thurstone model consistency asymptotic normality differential privacy
  • 相关文献

参考文献1

二级参考文献40

  • 1Dalenius T. Towards a methodology for statistical disclo- sure control. StatistikTidskrifi, 1977, 15:222-449.
  • 2Sweeney L. k-anonymity: a model for protecting privacy.International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10 (5) : 557-570.
  • 3Sweeney L. Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10(5) :571-588.
  • 4Li N H, Li T C, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceed- ings of the IEEE International Conference on Data Engi- neering, Istanbul, Turkey, 2007. 106-115.
  • 5Machanavajjhala A, Gehrke J, Kifer D, et al. l-diversi- ty: privacy beyond k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering. At- lanta, USA, 2006. 24-35.
  • 6Dwork C. Theory and Applications of Models of Computa- tion. Springer Berlin Heidelberg, 2008. 1-19.
  • 7Dwork C. Theory of Cryptography. Springer Berlin Hei- delberg, 2009. 496-502.
  • 8McSherry F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Pro- ceedings of the 2009 ACM SIGMOD International Confer- ence on Management of data. Providence, USA, 2009. 19-30.
  • 9Dwork C. Differential Privacy in New Settings. In: Pro- ceedings of the ACM-SIAM Symposium on Discrete Algo- rithms - SODA. Austin, USA, 2010. 174-183.
  • 10Dwork C. The promise of differential privacy: A tutorial on algorithmic techniques. In: Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Com- puter Science. Palm Springs, USA, 2011. 1-2.

共引文献4

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部