Return to Article Details Manipulation Attacks in Local Differential Privacy Download Download PDF