参考文献
[1]Shekhar S,Lu Chang-Tien,Zhang Pusheng.A Unified Approach to Detecting Spatial Outliers[J].GeoInformatica,2003,7(2):139-166.
[2]Cai Qiao,He Haibo,Man Hong.Spatial Outlier Detection Based on Iterative Self-organizing Learning Model[J].Neurocomputing,2013,117(14):161-172.
[3]Chen Dechang,Lu Chang-Tien,Kou Yufeng,et al.On Detecting Spatial Outliers[J].GeoInformatica,2008,12(4):455-475.
[4]Lu Chang-Tien,Chen Dechang,Kou Yufeng.Algorithms for Spatial Outlier Detection[C]//Proceedings of the 3rd IEEE International Conference on Data Mining.Washington D.C.,USA:IEEE Press,2003:597-600.
[5]Chawla S,Sun P.SLOM:A New Measure for Local Spatial Outliers[J].Knowledge and Information Systems,2005,9(4):412-429.
[6]Liu Xutong,Chen Feng,Lu Chang-Tien.On Detecting Spatial Categorical Outliers[J].GeoInformatica,2014,18(3):501-536.
[7]Vaidya J,Clifton C.Privacy-preserving Outlier Detection[C]//Proceedings of the 4th IEEE International Conference on Data Mining.Washington D.C.,USA:IEEE Press,2004:233-240.
[8]Challagalla A,Dhiraj S S S,Somayajulu D V L N,et al.Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods[C]//Proceedings of the 34th IEEE Annual Computer Software and Applications Conference
Workshops.Washington D.C.,USA:IEEE Press,2010:152-157.
[9]Dai Zaisheng,Huang Liusheng,Zhu Youwen,et al.Privacy Preserving Density-based Outlier Detection[C]//Proceedings of International Conference on Comm-unications and Mobile Computing.Washington D.C.,USA:IEEE Press,2010:80-85.
[10]Li Lu,Huang Liusheng,Yang Wei,et al.Privacy-Preserving LOF Outlier Detection[J].Knowledge and Information Systems,2015,42(3):579-597.
[11]Lu E,Pass R.Outlier Privacy[C]//Proceedings of the 12th Theory of Cryptography Conference.Warsaw,Poland:University of Warsaw,2015:277-305.
[12]Kou Yufeng,Lu Chang-Tien,Chen Dechang.Spatial Weighted Outlier Detection[C]//Proceedings of the 6th SIAM International Conference on Data Mining.Bethesda,Maryland:Society for Industrial and Applied Mathematics,2006:613-617.
[13]Kou Yufeng,Lu Chang-Tien,Santos R F D.Spatial Outlier Detection:A Graph-based Approach[C]//Proceedings of the 19th IEEE International Conference on Tools with Artificial Intelligence.Washington D.C.,USA:IEEE Press, 2007:281-288.
[14]Cao Lijun,Liu Xiyin,Wang Yubin,et al.WSO-based Spatial Outlier Detection Algorithms[J].Journal of Networks,2013,8(7):1582-1588.
[15]Yao A C.Protocols for Secure Computations[C]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science.Washington D.C.,USA:IEEE Press,1982:160-164.
[16]Han Jiawei,Kamber M,Pei J.Data Mining:Concepts and Techniques[M].3rd Edition.Burlington,USA:Morgan Kaufmann Publishers,2012.
[17]罗永龙,黄刘生,徐维江,等.一个保护私有信息的多边形相交判定协议[J].电子学报,2007,35(4):685-691.
[18]Gordon D S,Carmit H,Katz J,et al.Complete Fairness in Secure Two-party Computation[C]//Proceedings of the 40th Annual ACM Symposium on Theory of Computing.New York,USA:ACM Press,2010:157-176.
[19]Xue Anrong,Duan Xiqiang,Ma Handa,et al.Privacy Preserving Spatial Outlier Detection[C]//Proceedings of the 9th International Conference for Young Computer Scientists.Washington D.C.,USA:IEEE Press,2008:714-719.
[20]Murugesan M,Jiang Wei,Clifton C,et al.Efficient Privacy-preserving Similar Document Detection[J].VLDB Journal,2010,19(4):457-475.
[21]安徽省统计局.2014和2015年安徽省统计年鉴[EB/OL].http://www.ahtjj.gov.cn/tjj/web/tjnj_view.jsp?strColId=13787135717978521&_index=1#.
[22]薛俊菲,陈雯,张蕾.中国市域综合城市化水平测度与空间格局研究[J].经济地理,2010,30(12):2005-2011.
编辑刘冰 |