[1]Wu Weimin, Huang Huankun. A DPDBScan clustering algorithm based on differential privacy preserving[J]. Computer Engineering & Science, 2015,37(4):830834.(in Chinese)
[2]Srisungsittisunti B, Natwichai J. An incremental privacypreservation algorithm for the (k, e)anonymous model[J]. Computers & Electrical Engineering,2015,41:126141.
[3]Sweeney L. Achieving kanonymity privacy protection using generalization and suppression[J]. International Journal of Uncertainty Fuzziness and KnowledgeBased Systems,2002,10(5): 571588.
[4]Machanavajjhala A, Gehrke J, Kifer D, et al. lDiversity: Privacy beyond kanonymity[C]∥Proc of the 22nd International Conference on Data Engineering, 2006: 2436.
[5]Ninghui L,Tiancheng L, Venkatasubramanian S. tCloseness: Privacy beyond kanonymity and ldiversity[C]∥Proc of the 23rd International Conference on Data Engineering, 2007: 106115.
[6]Zhang Xiaolin,Wang Ying, Li Yufeng. A (α, k)anonymity method based on social networks[J]. Computer Engineering & Science, 2012, 34(11): 5054.(in Chinese)
[7]Holohan N,Leith D J,Mason O.Differential privacy in metric spaces: Numerical, categorical and functional data under the one roof[J]. Information Sciences, 2015, 305:256268.
[8]Martin D J, Kifer D, Machanavajjhala A, et al. Worstcase background knowledge for privacypreserving data publishing[C]∥Proc of the 23rd International Conference on Data Engineering, 2007: 126135.
[9]Kifer D. Attacks on privacy and deFinetti’s theorem[C]∥Proc of the 2009 ACM SIGMOD International Conference on Management of Data, 2009: 127138.
[10]Wang H, Liu R. Privacypreserving publishing microdata with full functional dependencies[J]. Data & Knowledge Engineering, 2011, 70(3): 249268.
[11]Giannella C R, Liu K, Kargupta H. Breaching Euclidean distancepreserving data perturbation using few known inputs[J]. Data & Knowledge Engineering, 2013, 83:93110.
[12]http://archive.ics.uci.edu/ml/datasets/Adult.
[13]NavarroArribas G, Torra V, Erola A, et al. User kanonymity for privacy preserving data mining of query logs[J]. Information Processing & Management, 2012, 48(3): 476487.
[14]Xiao X, Yi K, Tao Y. The hardness and approximation algorithms for ldiversity[C]∥Proc of the 13th International Conference on Extending Database Technology: Advances in Database Technology, 2010: 135146.
附中文参考文献:
[1]吴伟民,黄焕坤. 基于差分隐私保护的DPDBScan聚类算法研究[J]. 计算机工程与科学, 2015, 37(4): 830834.
[6]张晓琳,王颖,李玉峰. 基于社会网络的(α, k)匿名方法[J]. 计算机工程与科学, 2012, 34(11): 5054. |