[1] KANG Haiyan,MA Yuelei.Survey on application of data mining via differential privacy[J].Journal of Shandong University(Natural Science),2017,52(3):16-23.(in Chinese)康海燕,马跃雷.差分隐私保护在数据挖掘中应用综述[J].山东大学学报(理学版),2017,52(3):16-23. [2] YANG Chaofan,DENG Zhonghua,PENG Xin,et al.Review of information retrieval research:case study of conference papers[J].Data Analysis and Knowledge Discovery,2017,1(7):35-43.(in Chinese)杨超凡,邓仲华,彭鑫,等.近5年信息检索的研究热点与发展趋势综述——基于相关会议论文的分析[J].数据分析与知识发现,2017,1(7):35-43. [3] SAMARATI P.Protecting respondents identities in microdata release[J].IEEE Transactions on Knowledge and Data Engineering,2001,13(6):1010-1027. [4] SRIVATSA M,HICKS M.Deanonymizing mobility traces:using social network as a side-channel[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2012:628-637. [5] BLOND S L,ZHANG C,LEGOUT A,et al.I know where you are and what you are sharing:exploiting P2P communications to invade users'privacy[C]//Proceedings of 2011 ACM SIGCOMM Coference on Internet Measurement.New York,USA:ACM Press,2011:45-59. [6] WANG Pingshui.Research on anonymous privacy-preserving techniques based on clustering[J].New Technology of Library and Information Service,2010,26(11):53-58.(in Chinese)王平水.基于聚类的匿名化隐私保护技术研究[J].现代图书情报技术,2010,26(11):53-58. [7] LI Yang,WEN Wen,XIE Guangqiang.Survey of research on differential privacy[J].Application Research of Computers,2012,29(9):3201-3205.(in Chinese)李杨,温雯,谢光强.差分隐私保护研究综述[J].计算机应用研究,2012,29(9):3201-3205. [8] DWORK C.Differential privacy[J].Lecture Notes in Computer Science,2006,26(2):1-12. [9] DWORK C.Differential privacy:a survey of results[C]//Proceedings of International Conference on Theory and Applications of Models of Computation.Berlin,Germany:Springer,2008:1-19. [10] LI Hongcheng,WU Xiaoping.Network intrusion correlation method with differential privacy protection of alerts sequence[J].Computer Engineering,2018,44(5):128-132.(in Chinese)李洪成,吴晓平.支持告警序列差分隐私保护的网络入侵关联方法[J].计算机工程,2018,44(5):128-132. [11] ZHANG Xiaojian,MENG Xiaofeng.Differential privacy protection for data publishing and analysis[J].Chinese Journal of Computers,2014,37(4):927-949.(in Chinese)张啸剑,孟小峰.面向数据发布和分析的差分隐私保护[J].计算机学报,2014,37(4):927-949. [12] HAO Chenyan,PENG Changgen,ZHANG Panpan.Selection method of differential privacy protection parameter ε under repeated attack[J].Computer Engineering,2018,44(7):145-149.(in Chinese)郝晨艳,彭长根,张盼盼.重复攻击下差分隐私保护参数ε的选取方法[J].计算机工程,2018,44(7):145-149. [13] LI Wanjie,ZHANG Xing,CAO Guanghui,et al.Hierarchical data fusion publishing mechanism based on differential privacy protection[J].Journal of Chinese Computer Systems,2019,40(10):2252-2256.(in Chinese)李万杰,张兴,曹光辉,等.基于差分隐私保护的数据分级融合发布机制[J].小型微型计算机系统,2019,40(10):2252-2256. [14] FU Jibin,ZHANG Xiaojian,DING Liping.MAXGDDP:decision data release with differential privacy[J].Journal on Communications,2018,39(3):136-146.(in Chinese)傅继彬,张啸剑,丁丽萍.MAXGDDP:基于差分隐私的决策数据发布算法[J].通信学报,2018,39(3):136-146. [15] FLETCHER S,ISLAM M Z.Decision tree classification with differential privacy:a survey[EB/OL].[2018-12-25].http://pdfs.semanticscholar.org/6530/e1cc36eb3e868d20d2da9565eb8d3180c869.pdf. [16] BLUM A,DWORK C,MCSHERRY F,et al.Practical privacy:the SuLQ framework[C]//Proceedings of the 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.New York,USA:ACM Press,2005:128-138. [17] MCSHERRY F.Privacy integrated queries:an extensible platform for privacy-preserving data analysis[J].Communications of the ACM,2010,53(9):89-97. [18] FRIEDMAN A,SCHUSTER A.Data mining with differential privacy[C]//Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2010:493-502. [19] XIONG Ping,ZHU Tianqing,WANG Xiaofeng.A survey on differential privacy and applications[J].Chinese Journal of Computers,2014,37(1):101-122.(in Chinese)熊平,朱天清,王晓峰.差分隐私保护及其应用[J].计算机学报,2014,37(1):101-122. [20] MOHAMMED N,CHEN R,FUNG B C M,et al.Differentially private data release for data mining[C]//Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM Press,2011:493-501. [21] ZHU Tianqing,XIONG Ping,XIANG Yang,et al.An effective deferentially private data releasing algorithm for decision tree[C]//Proceedings of the 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications.Washington D.C.,USA:IEEE Press,2013:388-395. [22] CHEN Jiajun,MIAO Duoqian.Adaptive decision tree algorithm based on fusion of decision costs and attribute preference[J].Journal of Chinese Computer Systems,2018,39(6):1208-1212.(in Chinese)陈家俊,苗夺谦.一种决策风险代价与属性偏好融合的适应性决策树算法[J].小型微型计算机系统,2018,39(6):1208-1212. [23] BREIMAN L.Random forests[J].Machine Learning,2001,45(1):5-32. [24] WEI Zekun,XIA Jingbo,ZHANG Xiaoyan,et al.Research on traffic multi-feature extraction and classification based on random forest[J].Transducer and Microsystem Technologies,2016,35(12):55-59.(in Chinese)韦泽鲲,夏靖波,张晓燕,等.基于随机森林的流量多特征提取与分类研究[J].传感器与微系统,2016,35(12):55-59. [25] PATIL A,SINGH S.Differential private random forest[C]//Proceedings of 2014 International Conference on Advances in Computing,Communications and Informatics.Washington D.C.,USA:IEEE Press,2014:2623-2630. [26] MU Hairong,DING Liping,SONG Yuning et al.DiffPRFs:random forest under differential privacy[J].Journal on Communications,2016,37(9):175-182.(in Chinese)穆海蓉,丁丽萍,宋宇宁,等.DiffPRFs:一种面向随机森林的差分隐私保护算法[J].通信学报,2016,37(9):175-182. [27] DWORK C.A firm foundation for private data analysis[J].Communications of the ACM,2011,54(1):86-95. [28] DWORK C,MCSHERRY F,NISSIM K,et al.Calibrating noise to sensitivity in private data analysis[J].Lecture Notes in Computer Science,2012,3876(8):265-284. [29] MCSHERRY F,TALWAR K.Mechanism design via differential privacy[C]//Proceedings of the 48th Annual Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,2007:94-103. [30] BREIMAN L,FRIEDMAN J,STONE C,et al.Classification and regression trees[M].[S.l.],Wadsworth:1984. [31] LI Ruping.Research of decision tree classification algorithm in data mining[J].Journal of East China Institute of Technology(Natural Science Edition),2010,33(2):192-196.(in Chinese)李如平.数据挖掘中决策树分类算法的研究[J].东华理工大学学报(自然科学版),2010,33(2):192-196. [32] ZHOU Zhihua.Machine learning[M].Beijing:Tsinghua University Press,2016.(in Chinese)周志华.机器学习[M].北京:清华大学出版社,2016. [33] SU Dong,CAO Jianneng,LI Ninghui,et al.PrivPfC:differentially private data publication for classification[J].The VLDB Journal,2018,27(2):201-223. [34] LIU Xiaoqian,LI Qianmu,LI Tao,et al.Differentially private classification with decision tree ensemble[J].Applied Soft Computing,2018,62:807-816. |