共 21 条
- [1] Mondrian multidimensional K-anonymity. LEFEVRE K,DEWITT D,RAMAKRISHNAN R. Proc of22nd ICDE . 2006
- [2] Data privacy through optimal k-anonymization. R. Bayardo,R. Agrawal. the 21st International Conference on Data Engineering (ICDE’05) . 2005
- [3] Transforming data to satisfy privacy constraints. Iyengar V S. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining . 2002
- [4] Hiding in the crowd:Privacy preservation on evolving streams through correlation tracking. Feifei Li,Jimeng Sun,Spiros Papadimitriou,George A Mihaila,Ioana Stanoi. IEEE 23rd International Conference on Data Engineering ICDE’’07 . 2007
- [5] Incognito:Efficient full-domain K-anonymity. LeFevre K,DeWitt DJ,Ramakrishnan R. Proc.of the Int’l Conf.on Management of Data . 2005
- [6] l-diversity: Privacy beyond k-anonymity. Machanavajjhala A,Kifer D,Gehrke J, et al. ACM Transactions on Knowledge Discovery from Data . 2007
- [7] Top-down specialization for information and privacy preservation. Fung B C M,Wang K,Yu P S. Proceedings of the 21st International Conference on Data Engineering(ICDE) . 2005
- [8] K-anonymity: A model for protecting privacy. Sweeney L. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems . 2002
- [9] Anonymization-Based Attacks in Privacy-PreservingData Publishing. Wong R C-W,Fu A W-C,Wang K, et al. ACM Transaction of Database System . 2009
- [10] Privacy-Preserving data publishing for cluster analysis. Fung BCM,Wang K,Wang LY,Hung PCK. Data and Knowledge Engineering . 2009