共 14 条
- [1] Han J., Kamber M., Data Mining: Concepts and Techniques, (2006)
- [2] Zhou S.-G., Li F., Tao Y.-F., Xiao X.-K., Privacy preservation in database applications: A survey, Chinese Journal of Computers, 32, 5, pp. 847-861, (2009)
- [3] Machanavajjhala A., Gehrke J., Kifer D., Venlita-Subramaniam M., L-diversity: Privacy beyond k-anonymity, Proceedings of the 22nd International Conference on Data Engineering(ICDE), pp. 24-35, (2006)
- [4] Li N., Li T., T-closeness: Privacy beyond k-anonymity and l-diversity, Proceedings of the 23rd International Conference on Data Engineering (ICDE), pp. 106-115, (2007)
- [5] Sweeney L., Achieving k-anonymity privacy protection using generalization and suppression, International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 571-588, (2002)
- [6] Xiao X., Tao Y., Personalized privacy preservation, Proceedings of the ACM SIGMOD Conference on Management of Data(SIGMOD), pp. 229-240, (2006)
- [7] Aggarwal G., Feder T., Kenthapadi T., Khuller S., Panigrahy R., Thomas D., Zhu Z., Achieving anonymity via clustering, Proceedings of the Symposium on Principles of Database System(PODS), pp. 153-162, (2006)
- [8] Pei J., Xu J., Wang Z., Wang W., Wang K., Maintaining K-anonymity against incremental updates, Proceedings of the 19th International Conference on Scientific and Statistical Database Management(SSDBM), pp. 5-14, (2007)
- [9] Xu J., Wang W., Pei J., Wang X., Shi B., Fu A.W.-C., Utility-based anonymization using local recoding, Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 785-790, (2006)
- [10] Li T., Tang C., Wu J., Luo Q., Li S., Lin X., Zuo J., K-anonymity via clustering domain knowledge for privacy preservation, Proceedings of the 5th International Conference on Fuzzy Systems and Knowledge Discovery(FSKD), 4, pp. 697-701, (2008)