[1] WU Xiaotong,WU Taotao,KHAN M,et al.Game theory based correlated privacy preserving analysis in big data[J].IEEE Transactions on Big Data,2017(99):1. [2] ZHANG Yongtang,LUO Xianlu,LUO Haobo.A multi-step attack-correlation method with privacy protection[J].Journal of Communications and Information Networks,2016,1(4):133-142. [3] MENDES R,VILELA J P.Privacy-preserving data mining:methods,metrics,and applications[J].IEEE Access,2017,99(5):10562-10582. [4] SAMARATI P,SWEENEY L.Generalizing data to provide anonymity when disclosing information(abstract)[C]//Proceedings of the 17th ACM SIGACT-SIGMOD SIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,1998:188-197. [5] FUNG B C M,WANG Ke.Privacy-preserving data publishing:a survey of recent developments[J].ACM Computing Surveys,2010,42(4):2623-2627. [6] SWEENEY L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):571-578. [7] MACHANAVAJJHALA A,KIFER D,GEHRKE J.L-diversity:privacy beyond k-anonymity[C]//Proceedings of International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2006:24-28. [8] TRUTA T M,VINAY B.Privacy protection:p-sensitive k-anonymity property[C]//Proceedings of International Conference on Data Engineering Workshops.[S.1.]:IEEE Computer Society,2006:94. [9] LI Ninghui,LI Tiancheng,BRAMANIAN S V.T-closeness:privacy beyond k-anonymity and l-diversity[C]//Proceedings of IEEE International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2007:106-115. [10] LI Tiancheng,LI Ninghui,ZHANG Jian,et al.Slicing:a new approach for privacy preserving data publishing[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(3):561-574. [11] BHALADHARE P R,JJIWALA D C.Novel approaches for privacy preserving data mining in k-anonymity model[J].Journal of Information Science and Engineering,2016,32(1):63-78. [12] PRIYADARSINI R P,VALARMATHI M L,SIVAKUMARI S.Feature creation based slicing for privacy preserving data mining[C]//Proceedings of the 3th IKDD Conference on Data Science.New York,USA:ACM Press,2016:1-8. [13] ZHU Hong,TIAN Shengli.Privacy-preserving data publication with features of independent l-diversity[J].Computer Journal,2015,58(4):549-571. [14] TAO Yufei,XIAO Xiakui,LI Jiexing,et al.On anti-corruption privacy preserving publication[C]//Proceedings of IEEE International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2008:725-734. [15] HAN Jianmin,LUO Fangwei,LU Jianfeng,et al.SLOMS:a privacy preserving data publishing method for multiple sensitive attributes microdata[J].Journal of Software,2013,8(12). [16] LIU Qinghai,SHEN Hong,SANG Yingpeng.A privacy-preserving data publishing method for multiple numerical sensitive attributes via clustering and multi-sensitive bucketization[C]//Proceedings of the 6th International Symposium on Parallel Architectures,Algorithms and Programming.Washington D.C.,USA:IEEE Press,2014:220-223. [17] 康海燕,杨孔雨,陈建明.基于k匿名的个性化隐私保护方法研究[J].山东大学学报,2014,49(9):142-149. |