Fig. 2From: Local differential privacy for human-centered computingThe algorithm system structure. a Perturbation. b AggregationBack to article page