[1]Yan T,Lu Y,Zhang N.Privacy disclosure from wearable devices[C]∥Proc of the ACM Workshop on PrivacyAware Mobile Computing,2015:1318.
[2]Statista.Wearable device market value from 2010 to2018 (in million u.s.dollars)[EB/OL].[20160411].http://www.statista.com/statistics/259372/wearabledevicemarketvalue/.
[3]Cornelius C,Peterson R,Skinner J,et al.A wearable system that knows who wears it[C]∥Proc of the 12th ACM Annual International Conference on Mobile Systems,Applications,and Services,2014:5567.
[4]Lara O D,Labrador M A.A survey on human activity recognition using wearable sensors[J].IEEE Communications Surveys & Tutorials,2013,15(3):11921209.
[5]Casale P,Pujol O,Radeva P.Personalization and user verification in wearable systems using biometric walking patterns[J].Personal and Ubiquitous Computing,2012,16(5):563580.
[6]Mannini A, Sabatini A M. Machine learning methods for classifying human physical activity from onbody accelerometers[J].Sensors,2010,10(2):115475.
[7]Casale P,Pujol O,Radeva P.Human activity recognition from accelerometer data using a wearable device[M]∥Pattern Recognition and Image Analysis.Berlin:Springer Berlin Heidelberg,2011:289296.
[8]Ali H K,Amalarethinam D I G.Activity recognition with multitape fuzzy finite automata[J].International Journal of Modern Education & Computer Science,2013,5(5):6065.
[9]Zhang M,Sawchuk A.USCHAD:A daily activity dataset for ubiquitous activity recognition using wearable sensors[C]∥Proc of ACM Conference on Ubiquitous Computing.2012:10361043.
[10]Sweeney L. kanonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and KnowledgeBased Systems,2012,10(5):557570.
[11]Machanavajjhala A,Gehrke J,Kifer D,et al.Ldiversity:Privacy beyond kanonymity[C]∥Proc of IEEE International Conference on Data Engineering,2006:24.
[12]Li Ninghui, Li Tiancheng, Venkatasubramanian S. tcloseness:Privacy beyond kanonymity and ldiversity[C]∥Proc of IEEE 23rd International Conference on Data Engineering,2007:106115.
[13]Wu Yingjie,Ni Weiwei,Zhang Baili,et al.kAPPRP:A partitioning based privacy preserving kanonymous algorithm for republication of incremental datasets[J].Journal of Chinese Computer Systems,2009,30(8):15811587.(in Chinese)
[14]Zhu H, Ye X. Achieving kanonymity via a densitybased clustering method[C]∥Proc of Joint,AsiaPacific Web and,International Conference on WebAge Information Management Conference on Advances in Data and Web Management,2007:745752.
[15]Peng Jiing,Tang Changjie,Cheng Wenquan,et al.A hierarchy distance computing based clustering algorithm [J ].Chinese Journal of Computers,2007,30 (5):786795.(in Chinese)
[16]Li Jie,Gao Xinbo,Jiao Licheng.A GAbased clustering algorithm for large datasets with mixed numeric and categorical values [J].
Journal of Electronics & Information Technology,2004,26(8):1204 1209.(in Chinese)
[17]DomingoFerrer J, MateoSanz J M, Torra V. Comparing SDC methods for microdata on the basis of information lossanddis closure risk[C]∥Proc of ETKNTTS,2002.807 826.
[18]Sweeney L.Achieving kanonymity privacy protection using generalization and suppression[J].International Journal of Uncertainty,Fuzziness and KnowledgeBased Systems,2012,10(5):571588.
附中文参考文献:
[13]吴英杰,倪巍伟,张柏礼,等.kAPPRP:一种基于划分的增量数据重发布隐私保护k匿名算法[J].小型微型计算机系统,2009,30(8):15811587.
[15]彭京,唐常杰,程温泉,等.一种基于层次距离计算的聚类算法[J].计算机学报,2007,30(5):786795.
[16]李洁,高新波,焦李成.一种基于GA的混合属性特征大数据集聚类算法[J].电子与信息学报,2004,26(8):12041209.