[1]Zhou Shuigeng, Li Feng, Tao Yufei, et al. Privacy preservation in database applications:A survey[J]. Chinese Journal of Computers, 2009, 32(5):847860.(in Chinese)
[2]Han Jiawei. Data mining concepts and techniques[M]. Beijing:China Machine Press, 2001.(in Chinese)
[3]Chong Zhihong, Ni Weiwei, Liu Tengteng, et al. A privacypreserving data publishing algorithm for clustering application[J]. Journal of Computer Research and Development, 2010,47(12):20832089.(in Chinese)
[4]Gentry C. Fully homomorphic encryption using ideal lattices[C]∥Proc of the 41st Annual ACM Symposium on Theory of Computing (STOC’09), 2009:169178.
[5]Kamakshi P, Babu A V. Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data[J]. Journal of Computing, 2010, 2(4):115119.
[6]Vaidya J, Clifton C W, Zhu Y M. Privacy preserving data mining[M]. Purdue:Springer, 2006.
[7]Vaidya J, Clifton C. Privacypreserving Kmeans clustering over vertically partitioned data[C]∥Proc of the SIGKDD’03, 2003:2427.
[8]Kumar K A, Rangan C P. Privacy preserving DBSCAN algorithm for clustering [J].Advanced Data Mining and Applications, 2007, 4632:5768.
[9]Gentry C. Fully homomorphic encryption using ideal lattices[C]∥Proc of Symposium on the Theory of Computing (STOC), 2009:169178.
[10]Halkidi M, Vazirgiannis M, Batistakis Y. Quality scheme assessment in the clustering process[C]∥Proc of PKDD Conference, 2000:265276.
附中文参考文献:
[1]周水庚,李丰,陶宇飞,等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报,2009, 32(5):847860.
[2]韩家炜.数据挖掘概念与技术[M].北京:机械工业出版社,2001.
[3]崇志宏,倪巍伟,刘腾腾,等. 一种面向聚类的隐私保护数据发布方法[J]. 计算机研究与发展,2010,47(12):20832089. |