Computer Science ›› 2017, Vol. 44 ›› Issue (7): 42-46.doi: 10.11896/j.issn.1002-137X.2017.07.008
Previous Articles Next Articles
LIAO Jun, JIANG Chao-hui, GUO Chun and PING Yuan
[1] FENG D G,ZHANG M,LI H.Big data security and privacyprotection [J].Chinese Journal of Computers,2014,37(1):246-258.(in Chinese) 冯登国,张敏,李昊.大数据安全与隐私保护[J].计算机学报,2014,7(1):246-258. [2] LIU Y H,ZHANG T Y,JIN X L,et al.Personal privacy protection in the era of big data [J].Journal of Computer Research and Development,2015,52(1):229-247.(in Chinese) 刘雅辉,张铁赢,勒小龙,等.大数据时代的个人隐私保护[J].计算机研究与发展,2015,2(1):229-247. [3] SWEENEY L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge based Systems,2002,10(5):571-578. [4] AGGARWAL G,PANIGRAHY R,FEDR T,et al.Achievinganonymity via clustering [J].ACM Transactions on Algorithms,2010,6(3):1-19. [5] B C,FUNG M,WANG K,et al.Top-Down Specialization for Information and Privacy Preservation[C]∥Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE2005).Tokyo Japan,2005:205-216. [6] XU J,WANG WEI,PEI J,et al.Utility-based anonymization using local recoding[C]∥ Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining (SIGK-DD).Philadelphia,PA,USA,2006:785-790. [7] LI T C,LI N H.On the tradeoff between privacy and utility in data publishing [C]∥Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.New York,NY,USA:Association for Computing Machinery,2009:517-525. [8] SHEN Y G,SHAO H,ZHANG Y Q.Research on privacy preserving distributed decision-tree classification algorithm[J].Application Research of Computers,2010,7(8):3070-3072.(in Chinese) 申艳光,邵慧,张永强.隐私保护的分布式决策树分类算法的研究[J].计算机应用研究,2010,7(8):3070-3072. [9] LI G,WANG Y D.An improved privacy-preserving classifica-tion mining method based on singular value decomposition [J].ACTA Electronica Sinica,2012,0(4):739-744.(in Chinese) 李光,王亚东.一种改进的基于奇异值分解的隐私保持分类挖掘方法[J].电子学报,2012,0(4):739-744. [10] KISILEVICH S,ROKACH L,ELOVICI Y,et al.Efficient multidimensional suppression for K-anonymity[J].IEEE Transactions on Knowledge and Data Engineering,2010,2(3):334-347. [11] ZHAO S,CHEN L.Personalized (a,l)-anonymity method based on sensitivity[J].Computer Engineering,2015,1(1):115-120.(in Chinese) 赵爽,陈力.基于敏感度个性化 (a,l)-匿名方法[J].计算机工程,2015,41(1):115-120. [12] YANG J,WANG C,ZHANG J P,et al.Micro-aggregation algorithm based on sensitive attribute entropy[J].ACTA Electronica Sinica,2014,2(7):1327-1337.(in Chinese) 杨静,王超,张健沛,等.基于敏感属性熵的微聚集算法[J].电子学报,2014,2(7):1327-1337. [13] LI J Y,LIU J X,BAIG M.Information based data anonymization for classification utility[J].IEEE Transactions on Knowle-dge and Data Engineering,2011,0(12):1030-1045. [14] XU Y,QIN X L,YANG Y T,et al.A QIweight-aware approach to privacy preserving publishing data set[J].Journal of Compu-ter Research and Development,2012,9(5):913-924.(in Chinese) 徐勇,秦小麟,杨一涛,等.一种考虑属性权重的隐私保护数据发布方法[J].计算机研究与发展,2012,9(5):913-924. |
No related articles found! |
|