共 50 条
- [41] Research in microaggregation algorithms for k-anonymization Tien Tzu Hsueh Pao, 2008, 10 (2021-2029):
- [42] Evaluating Privacy Metrics for Graph Anonymization and De-anonymization PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 817 - 819
- [43] How to find an appropriate k for k-anonymization 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 273 - 279
- [44] Flexible sensitive K-anonymization on transactions WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (04): : 2391 - 2406
- [45] Frequent tables for fast K-anonymization 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1239 - 1242
- [46] Evaluation of Generalization Based K-Anonymization Algorithms 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON SENSING, SIGNAL PROCESSING AND SECURITY (ICSSS), 2017, : 171 - 175
- [47] A Study on Fuzzy Clustering-based k-anonymization for Privacy Preserving Crowd Movement Analysis with Face Recognition PROCEEDINGS OF THE 2015 SEVENTH INTERNATIONAL CONFERENCE OF SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2015), 2015, : 37 - 41
- [48] K-Anonymization Incremental Maintenance and Optimization Techniques APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 380 - +
- [49] Every Anonymization Begins with k: A Game-Theoretic Approach for Optimized k Selection in k-Anonymization PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATION ENGINEERING (ICACCE-2020), 2020,
- [50] Secure k-Anonymization over Encrypted Databases 2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 20 - 30