[1] |
Samarati P,Sweeney L.Generalizing data to provide anonymity when disclosing information [C]∥Proc of the PODS’98,1998:188.
|
[2] |
Sweeney L. Achieving kanonymity privacy protection using generalization and suppression [J].International Journal on Uncertainty,Fuzziness and KnowledgeBased Systems,2002,10(5):571588.
|
[3] |
Sweeney L. Kanonymity:A model for protecting privacy [J].International Journal of Uncertainty,Fuzziness and KnowledgeBased Systems,2002,10(5):557570.
|
[4] |
Machanavajjhala A,Kifer D,Gehrke J,et al.ldiversity: Privacy beyond kanonymity[C]∥Proc of the 22nd International Conference on Data Enginering,2006:2435.
|
[5] |
Li Ninghui,Li Tiancheng.tCloseness: Privacy beyond kanonymity and ldiversity [C]∥Proc of the 23rd International Conference on Data Engineering,2007:106115.
|
[6] |
Wong R CW,Li Jy, Chee A W, et al.(α,k)anonymity:An enhanced kanonymity model for privacypreserving data publishing[C]∥Proc of KDD’06,2006:754759.
|
[7] |
Kumara V, Rao S S, Raju K, et al. Fuzzy based approach for privacy preserving publication of data [J].International Journal of Computer Science and Network Security,2008,8(1):115121.
|
[8] |
Truta T M, Vinay B. Privacy protection: psensitive kanonymity property[C]∥Proc of the 22nd IEEE International Conference on Data Engineering Workshops,2006:94103.
|
[9] |
Zhou Shuigeng, Li Feng, Tao Yufei, et al. Privacy preservation in database applications: A survey [J].Chinese Journal of Computers,2009,32(5):847860.(in Chinese)
|
[10] |
Poovammal E,Ponnavaikko M.An improved method for privacy preserving data mining[C]∥Proc of 2009 IEEE International Advanced Computing Conference,2009:14531458.
|
[11] |
Liu Yahui, Zhang Tieying, Jin Xiaolong, et al. Personal privacy protection in the era of big data [J].Journal of Computer Research and Development,2015,52(1): 229248.(in Chinese)
|
[12] |
Hu Jun, Wang Guoyin, Zhang Qinghua. Covering based generalized rough fuzzy set model [J].Journal of Software,2010,21(5):968977.(in Chinese)
|
[13] |
Chen Tieming,Ma Jixia, Huang S H,et al. Novel and efficient method on feature selection and data classification [J].Journal of Computer Research and Development,2012,49(4): 735745.(in Chinese)
|
[14] |
Huang Maofeng,Ni Weiwei,Wang Jiajun,et al.A logarithmic spiral based data perturbation method for clustering [J].Chinese Journal of Computers,2012,35(11): 22752282.(in Chinese)
|
|
附中文参考文献:
|
[9] |
周水庚,李丰,陶宇飞,等.面向数据库应用的隐私保护研究综述[J].计算机学报,2009,32(5):847860.
|
[11] |
刘雅辉,张铁赢,靳小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展,2015,52(1):229248.
|
[12] |
胡 军,王国胤,张清华.一种覆盖粗糙模糊集模型[J].软件学报,2010,21(5):968977.
|
[13] |
陈铁明,马继霞,Huang S H,等.一种新的快速特征选择和数据分类方法[J].计算机研究与发展,2012,49(4): 735745.
|
[14] |
黄茂峰,倪巍伟,王佳俊,等.一种面向聚类的对数螺线数据扰动方法[J].计算机学报,2012,35(11): 22752282.
|