[1] SWEENEY L.k-anonymity:a model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [2] MACHANAVAJJHALA A,KIFER D,GEHRKE J,et al.L-diversity:privacy beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3. [3] LI N H,LI T C,VENKATASUBRAMANIAN S.t-closeness:privacy beyond k-anonymity and l-diversity[C]//Proceedings of 2007 IEEE International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2007:106-115. [4] WONG R C W,LI J Y,FU A W C,et al.(α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[C]//Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2006:754-759. [5] DWORK C.Differential privacy[C]//Proceedings of the 33rd International Conference on Automata,Languages and Programming.Berlin,Germany:Springer,2006:1-12. [6] XIONG Ping,ZHU Tianqing,WANG Xiaofeng.A survey on differential privacy and applications[J].Chinese Journal of Computers,2014,37(1):101-122.(in Chinese) 熊平,朱天清,王晓峰.差分隐私保护及其应用[J].计算机学报,2014,37(1):101-122. [7] SU Sen,TANG Peng,CHENG Xiang,et al.Differentially private multi-party high-dimensional data publishing[C]//Proceedings of 2016 IEEE International Conference on Data Engineering.Washington D.C.,USA:IEEE Computer Society,2016:205-216. [8] ZHANG Xiaojian,MENG Xiaofeng.Streaming histogram publication method with differential privacy[J].Journal of Software,2016,27(2):381-393.(in Chinese) 张啸剑,孟小峰.基于差分隐私的流式直方图发布方法[J].软件学报,2016,27(2):381-393. [9] LI Wanjie,ZHANG Xing,CAO Guanghui,et al.Hierarchical data fusion publishing mechanism based on differential privacy protection[J].Journal of Chinese Computer Systems,2019,40(10):2252-2256.(in Chinese) 李万杰,张兴,曹光辉,等.基于差分隐私保护的数据分级融合发布机制[J].小型微型计算机系统,2019,40(10):2252-2256. [10] WANG Qian,ZHANG Yan,LU Xiao,et al.Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy[C]//Proceedings of the 35th Annual IEEE International Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2016:52-60. [11] HUO Zheng,MENG Xiaofeng.A trajectory data publication method under differential privacy[J].Chinese Journal of Computers,2018,41(2):400-412.(in Chinese) 霍峥,孟小峰.一种满足差分隐私的轨迹数据发布方法[J].计算机学报,2018,41(2):400-412. [12] CUI Lei.Research on some key security issues for social network information dissemination[D].Taiyuan:Taiyuan University of Technology,2019.(in Chinese) 崔磊.面向社交网络信息传播的若干关键安全问题研究[D].太原:太原理工大学,2019. [13] SHI Xiujin,LI Hanyue.A social network publishing graph model based on differential privacy protection[J].Intelligent Computer and Application,2019,9(1):28-30,35.(in Chinese) 石秀金,李寒悦.一种基于差分隐私保护的社交网络发布图模型[J].智能计算机与应用,2019,9(1):28-30,35. [14] BUN M,STEINKE T,ULLMAN J.Make up your mind:the price of online queries in differential privacy[C]//Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms.New York,USA:ACM Press,2017:1306-1325. [15] YUAN Ganzhao,YANG Yin,ZHANG Zhenjie,et al.Convex optimization for linear query processing under approximate differential privacy[C]//Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2016:2005-2014. [16] NI Lina,LI Chao,LIU Haoren,et al.Differential private preservation multi-core DBScan clustering for network user data[J].Procedia Computer Science,2018,129:257-262. [17] LI Tong,LI Jin,LIU Zheli,et al.Differentially private naive Bayes learning over multiple data sources[J].Information Sciences,2018,444:89-104. [18] QU Jingjing,CAI Ying,XIA Hongke.Summary of research on differential privacy protection for dynamic data publishing[J].Journal of Beijing Information Science and Technology University,2019,34(6):30-36.(in Chinese) 屈晶晶,蔡英,夏红科.面向动态数据发布的差分隐私保护研究综述[J].北京信息科技大学学报(自然科学版),2019,34(6):30-36. [19] LI Hongcheng,WU Xiaoping.Network intrusion correlation method with differential privacy protection of alerts sequence[J].Computer Engineering,2018,44(5):128-132.(in Chinese) 李洪成,吴晓平.支持告警序列差分隐私保护的网络入侵关联方法[J].计算机工程,2018,44(5):128-132. [20] MU Hairong,DING Liping,SONG Yuning,et al.DiffPRFs:random forest under differential privacy[J].Journal on Communications,2016,37(9):175-182.(in Chinese) 穆海蓉,丁丽萍,宋宇宁,等.DiffPRFs:一种面向随机森林的差分隐私保护算法[J].通信学报,2016,37(9):172-182. [21] DWORK C.Calibrating noise to sensitivity in private data analysis[J].Lecture Notes in Computer Science,2012,3876(8):265-284. [22] MCSHERRY F,TALWAR K.Mechanism design via differential privacy[C]//Proceedings of FOCS’07.Washington D.C.,USA:IEEE Press,2007:94-103. [23] MCSHERRY F D.Privacy integrated queries:an extensible platform for privacy-preserving data analysis[C]//Proceedings of 2009 ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2009:19-30. [24] BLUM A,DWORK C,MCSHERRY F,et al.Practical privacy:the SuLQ framework[C]//Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,2005:128-138. [25] FRIEDMAN A,SCHUSTER A.Data mining with differential privacy[C]//Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2010:493-502. [26] MOHAMMED N,CHEN R,FUNG B,et al.Diff-erentially private data release for data mining[C]//Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2011:493-501. [27] ZHU Tainqing,XIONG Ping,XIANG Yang,et al.An effective deferentially private data releasing algorithm for decision tree[C]//Proceedings of the 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Washington D.C.,USA:IEEE Press,2013:362-374. [28] JAGANNATHAN G,PILLAIPAKKAMNATT K,WRIGHT R N.A practical differentially private random decision tree clas-sifier[C]//Proceedings of ICDMW’09.Washington D.C.,USA:IEEE Press,2009:114-121. [29] PATIL A,SINGH S.Differential private random forest[C]//Proceedings of ICACCI’14.Washington D.C.,USA:IEEE Press,2014:2623-2630. [30] SMITH A.Privacy-preserving statistical estimation with optimal convergence rate[C]//Proceedings of the 43th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2011:813-822. [31] CHAUDHURI K,MONTELEONI C.Privacy-preserving logistic regression[C]//Proceedings of the 20th Annual Conference on Neural Information Processing Systems.Washington D.C.,USA:IEEE Press,2008:289-296. [32] CHAUDHURI K,MONTELEONI C,SARWATE A D.Differential private empirical risk minimization[J].The Journal of Machine Learning Research,2011,12:1069-1109. [33] ZHANG Jun,ZHANG Zhenjie,XIAO Xiaokui,et al.Functional mechanism:regression analysis under differential privacy[J].Proceedings of the VLDB Endowment,2012,5(11):1364-1375. [34] ZHENG Jian,ZOU Hongzhen.Linear regression analysis algorithm of differential privacy budget allocation[J].Computer Applications and Software,2016,33(3):275-278.(in Chinese) 郑剑,邹鸿珍.差异化隐私预算分配的线性回归分析算法[J].计算机应用与软件,2016,33(3):275-278. |