共 50 条
- [1] NESTGate Realizing Personal Data Protection with k-Anonymization Technology [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 37 - 42
- [2] Data privacy through optimal k-anonymization [J]. ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2005, : 217 - 228
- [4] The DAta Protection REgulation COmpliance Model [J]. IEEE SECURITY & PRIVACY, 2019, 17 (06) : 72 - 76
- [5] The DAta Protection REgulation COmpliance Model [J]. IEEE Security and Privacy, 2019, 17 (06): : 37 - 45
- [6] Achieving High Data Utility K-Anonymization Using Similarity-Based Clustering Model [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2069 - 2078
- [7] Automated k-Anonymization and l-Diversity for Shared Data Privacy [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 105 - 120
- [8] Utility-Driven k-Anonymization of Public Transport User Data [J]. IEEE ACCESS, 2021, 9 : 23608 - 23623