Computer Science ›› 2021, Vol. 48 ›› Issue (9): 9-20.doi: 10.11896/jsjkx.201000011
Special Issue: Intelligent Data Governance Technologies and Systems
• Intelligent Data Governance Technologies and Systems • Previous Articles Next Articles
LEI Yu-xiao , DUAN Yu-cong
CLC Number:
[1]O'NEILL E,KOSTAKOS V,KINDBERG T,et al.Instrumenting the City:Developing Methods for Observing and Understanding the Digital Cityscape [C]//Lecture Notes in Computer Science.2006,4206:315-322. [2]GIRARDIN F,CALABRESE F,FIORE F D,et al.Digital Footprinting:uncovering tourists with user-generated content[J].IEEE Pervasive Computing,2008,7(4):36-43. [3]HU H,GE Y J,HOU D Y.Using Web Crawler Technology for Geo-Events Analysis:A Case Study of theHuangyan Island Incident[J].Sustainability,2014,6(4):1896-1912. [4]KRUMM J,DAVIES N,NARAYANASWAMI C.User-generated content[J].IEEE Pervasive Computing,2008,7(4):10-11. [5]LEI Y,DUAN Y.Personality Classification and ConversionMethod of Virtual Community Personnel Based on DIKW Graph[J].Chinese Journal of Applied Sciences,2020,38(5):803-824. [6]ULRIKE H.Reviewing person's value of privacy of online social networking[J].Internet Research,2011,21(4):384-407. [7]BOZDA E.Bias in algorithmic filtering and personalization[J].Ethics & Information Technology,2013,15(3):209-227. [8]MITTELSTADT B D,ALLO P,TADDEO M,et al.The ethics of algorithms:mapping the debate[J].Big Data and Society,2016,3(2):1-21. [9]DUAN Y C,ZHAN L G,ZHANG XY,et al.Formalizing DIKW Architecture for Modeling Security and Privacy as Typed Resources[C]//Testbeds and Research Infrastructures for the Development of Networks and Communities.2018:157-168. [10]DUAN Y C,SHAO L X,HU G Z,et al.Specifying architecture of knowledge graph with data graph,information graph,know-ledge graph and wisdom graph[C]//IEEE International Confe-rence on Software Engineering Research.IEEE,2017. [11]SONG Z Y,DUAN Y C,WAN S X,et al.Processing Optimization of Typed Resources with Synchronized Storage and Computation Adaptation in Fog Computing[J].Wireless Communications and Mobile Computing,2018,2018:1-13. [12]GURSES S,ALAMO J M D.Privacy Engineering:Shaping an Emerging Field of Research and Practice[J].IEEE Security & Privacy,2016,14(2):40-46. [13]DUAN Y C,SUN X B,CHE H Y,et al.Modeling Data,Information and Knowledge for Security Protection of Hybrid IoT and Edge Resources[J].IEEE Access,2019,7:99161-99176. [14]DUAN Y C.Existence Computation:Revelation on Entity vs.Relationship for Relationship Defined Everything of Semantics[C]//2019 20th IEEE/ACIS International Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing (SNPD).2019:139-144. [15]OLSON D L.Data mining in business services[J].Service Business,2007,1(3):181-193. [16]KURGAN L A,MUSILEK P.A survey of Knowledge Discovery and Data Mining process models[J].The Knowledge Enginee-ring Review,2006,21(1):1-24. [17]VISSER W,HINDRIKS K V,JONKER C M.Argumentation-Based Qualitative Preference Modelling with Incomplete and Uncertain Information[J].Group Decision & Negotiation,2012,21(1):99-127. [18]MITTELSTAD B.From Individual to Group Privacy in Big Data Analytics[J].Philosophy & Technology,2017,30(4):475-494. [19]VASSILIADIS P.A Survey of Extract-Transform-Load Technology[J].International Journal of Data Warehousing & Mi-ning,2009,5(3):1-27. [20]HARIRI R H,FREDERICKS E M,BOWERS K M.Uncertainty in big data analytics:survey,opportunities,and challenges[J].Journal of Big Data,2019,6(1):44. [21]HARPER J.Privacy and the Four Categories of InformationTechnology[R].American Enterprise Institute Report,2020. [22]EKSTRAND M D,JOSHAGHANI R,MEHRPOUYAN H.Privacy for All:Ensuring Fair and Equitable Privacy Protections[C]//Proceedings of the 1st Conference on Fairness,Accountability and Transparency.2018:35-47. [23]HOFFMAN S,PODGURSKI A.Balancing Privacy,Autonomy,and Scientific Needs In Electronic Health Records Research[J].SMU law review:a publication of Southern Methodist University School of Law,2012,65(1):85-144. [24]SOLOVE D J.The Future of Reputation:Gossip,Rumor,and Privacy on the Internet[M]//Yale University Press,2007. [25]GORMAN D.Rights in Collision: The Individual Right of Privacy and the Public Right To Know[J].Asahi Law Review Asahi University School of Law,1978,35(2):249-257. [26]MANTELERO A.The EU Proposal for a General Data Protection Regulation and the roots of the right to be forgotten[J].Computer Law & Security Review,2013,29(3),229-235. [27]WALLACE K A.Anonymity[J].Ethics and Information Technology,1999,1(1):21-31. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[3] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[4] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[5] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[6] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[7] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[8] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[9] | YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71. |
[10] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
[11] | GUO Rui, LU Tian-liang, DU Yan-hui, ZHOU Yang, PAN Xiao-qin, LIU Xiao-chen. WSN Source-location Privacy Protection Based on Improved Ant Colony Algorithm [J]. Computer Science, 2020, 47(7): 307-313. |
[12] | WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291. |
[13] | XU Chong-jian,LI Xian-feng. Data Privacy Protection Method of Block Chain Transaction [J]. Computer Science, 2020, 47(3): 281-286. |
[14] | ZHAO Nan,ZHANG Guo-an. Authenticated Privacy Protection Scheme Based on Certificateless Ring Signcryption in VANET [J]. Computer Science, 2020, 47(3): 312-319. |
[15] | LV Zhi-quan, LI Hao, ZHANG Zong-fu, ZHANG Min. Topic-based Re-identification for Anonymous Users in Social Network [J]. Computer Science, 2019, 46(6): 143-147. |
|