参考文献
[1]冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,37(1):246-258.
[2]Sweeney L.Achieving k-Anonymity Privacy Protection Using Generalization and Suppression[J].International Journal of Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):571-588.
[3]Machanavajjhala A,Kifer D,Gehrke J,et al.l-Diversity:Privacy Beyond k-Anonymity[J].ACM Transactions on Knowledge Discovery From Data,2007,1(1):1-52.
[4]Li Ninghui,Li Tiancheng,Venkatasubramanian S.t-Close-ness:Privacy Beyond k-Anonymity and l-Diversity[C]//Proceedings of International Conference on Data Engineering.Istanbul,Turkey:IEEE Press,2007.
[5]张啸剑,孟小峰.面向数据发布和分析的差分隐私保护[J].计算机学报,2014,37(4):927-949.
[6]熊平,朱天清,王晓峰.差分隐私保护及其应用[J].计算机学报,2014,37(1):101-122.
[7]Mohammed N,Chen Rui,Fung B,et al.Differentially Private Data Release for Data Mining[C]//Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Diego,USA:ACM Press,2011:214-222.
[8]Zhu Tianqing,Xiong Ping,Xiang Yang,et al.An Effective Deferentially Private Data Releasing Algorithm for Decision Tree[C]//Proceedings of the 12th IEEE International Conference on Trust,Security and Privacy in Computing and
Communications.Melbourne,Australia:IEEE Press,2013:362-374.
[9]Zhang Jun,Cormode G,Procopiuc C M,et al.Privbayes:Private Data Release via Bayesian Networks[C]//Proceedings of 2014 ACM SIGMOD International Conference on Management of Data.Snowbird,USA:ACM Press,2014:365-375.
[10]陈旋,刘健,冯新淇,等.基于朴素贝叶斯的差分隐私合成数据集发布算法[J].计算机科学,2015,42(1):236-238.
[11]Samet S,Miri A.Privacy Preserving ID3 Using Gini Index over Horizontally Partitioned Data[C]//Pro-ceedings of IEEE/ACS International Conference on Computer Systems and Applications.Doha,Qatar:IEEE Press,2008:158-165.
[12]Dwork C,McSherry F,Nissim K,et al.Calibrating Noise to Sensitivity in Private Data Analysis[M].Berlin,Germany:Springer,2006:265-284.
[13]McSherry F,Talwar K.Mechanism Design via Differential Privacy[C]//Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science.Providence,USA:IEEE Press,2007:197-203.
[14]McSherry F D.Privacy Integrated Queries:An Extensible Platform for Privacy-preserving Data Analysis[C]//Proceedings of ACM SIGMOD International Conference on Management of Data.Providence,USA:ACM Press,2009:459-467.
[15]张琳,陈燕,李桃迎,等.决策树分类算法研究[J].计算机工程,2011,37(13):66-67,70.
[16]Sankar L,Rajagopalan S R,Poor H V.Utility-privacy Tradeoffs in Databases:An Information-theoretic App-roach[J].IEEE Transactions on Information Forensics and Security,2013,8(6):838-852.
编辑索书志 |