Computer Science ›› 2019, Vol. 46 ›› Issue (10): 148-153.doi: 10.11896/jsjkx.190100050
• Information Security • Previous Articles Next Articles
KE Chang-bo1,2, HUANG Zhi-qiu2, WU Jia-yu1
CLC Number:
[1]SNIJDERS C,MATZAT U,REIPS U D.“Big Data”:big gaps of knowledge in the field of internet science[J].International Journal of Internet Science,2012,7(1):1-5. [2]DU J,JIANG C,CHEN K C,et al.Community-structured evolutionary game for privacy protection in social networks[J].IEEE Transactions on Information Forensics and Security,2018,13(3):574-589. [3]HUGUENIN K,BILOGREVIC I,MACHADO J S,et al.A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins[J].IEEE Transactions on Mobile Computing,2018,17(4):760-774. [4]PENG H F,HUANG Z Q,FAN D J,et al.Specification and Verification of User Privacy Requirements for Service Composition[J].Journal of Software,2016,27(8):1948-1963.(in Chinese) 彭焕峰,黄志球,范大娟,等.面向服务组合的用户隐私需求规约与验证方法[J].软件学报,2016,27(8):1948-1963. [5]LIU X Y,WANG B,YANG X C.Survey on Privacy Preserving Techniques for Publishing Social Network Data[J].Journal of Software,2014,25(3):576-590.(in Chinese) 刘向宇,王斌,杨晓春.社会网络数据发布隐私保护技术综述[J].软件学报,2014,25(3):576-590. [6]ZHANG Y X,HE J S,ZHAO B, et al.A Privacy Protection Model Base on Game Theory [J].Chinese Journal of Compu-ters,2016,39(3):615-627.(in Chinese) 张伊璇,何泾沙,赵斌,等.一个基于博弈理论的隐私保护模型[J].计算机学报,2016,39(3):615-627. [7]WU D,SI S,WU S,et al.Dynamic trust relationships aware data privacy protection in mobile crowd-sensing[J].IEEE Internet of Things Journal,2018,5(4):2958-2970. [8]XIAO Z,YANG J J,HUANG M,et al.QLDS:A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Participatory Sensing[J].IEEE Transactions on Mobile Computing,2018,17(6):1397-1410. [9]KE C B,HUANG Z,LI W,et al.Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing[J].Journal of Applied Mathematics,2014,2014:1-11. [10]GU L,CHEUNG S C.Constructing and testing privacy aware services in cloud computing environment:Challenges and opportunities[C]//Proceedings of the 1st Asia-Pacific Symposium on Internet ware.New York:ACM,2009:1-10. [11]NI W W,CHONG Z H.Clustering-oriented privacy-preserving data publishing[J].Knowledge-Based Systems,2012,35: 264-270. [12]POLATIDIS N,GEORGIADIS C K,PIMENIDIS E,et al.Priva-cy-preserving collaborative recommendations based on random perturbations[J].Expert Systems with Applications,2017,71:18-25. [13]YE M,WU X,HU X,et al.Anonymizing classification data using rough set theory[J].Knowledge-Based Systems,2013,43:82-94. [14]LI S,ZHANG X,QIAN Z,et al.Key based Artificial Fingerprint Generation for Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2018,PP(99):1-1. [15]GAI K,CHOO K K R,QIU M,et al.Privacy-preserving con-tent-oriented wireless communication in internet-of-things[J].IEEE Internet of Things Journal,2018,5(4):3059-3067. |
[1] | CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112. |
[2] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[3] | SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73. |
[4] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[5] | WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42. |
[6] | YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117. |
[7] | WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85. |
[8] | WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211. |
[9] | TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203. |
[10] | ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242. |
[11] | LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264. |
[12] | ZHANG Guang-jun, ZHANG Xiang. Mechanism and Path of Optimizing Institution of Legislative Evaluation by Applying “Big Data+Blockchain” [J]. Computer Science, 2021, 48(10): 324-333. |
[13] | YE Ya-zhen, LIU Guo-hua, ZHU Yang-yong. Two-step Authorization Pattern of Data Product Circulation [J]. Computer Science, 2021, 48(1): 119-124. |
[14] | ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116. |
[15] | MA Meng-yu, WU Ye, CHEN Luo, WU Jiang-jiang, LI Jun, JING Ning. Display-oriented Data Visualization Technique for Large-scale Geographic Vector Data [J]. Computer Science, 2020, 47(9): 117-122. |
|