共 50 条
- [21] A FAST AND STABLE CLUSTERING ALGORITHM FOR K-ANONYMITY MODEL [J]. 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 3: COMPUTER-AIDED DESIGN, MANUFACTURING AND MANAGEMENT, 2011, : 275 - 279
- [22] A K-anonymity Clustering Algorithm Based on the Information Entropy [J]. PROCEEDINGS OF THE 2014 IEEE 18TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2014, : 319 - 324
- [23] Study on Privacy Protection Algorithm Based on K-Anonymity [J]. 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
- [24] k-Presence-Secrecy: Practical Privacy Model as Extension of k-Anonymity [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (04): : 730 - 740
- [25] Data anonymization: a novel optimal k-anonymity algorithm for identical generalization hierarchy data in IoT [J]. Service Oriented Computing and Applications, 2020, 14 : 89 - 100
- [27] Anatomy: Uncertain data k-anonymity privacy protection algorithm [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1689 - +
- [28] An improved weighted-feature clustering algorithm for k-anonymity [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 415 - 418
- [29] k-anonymity: risks and the reality [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 983 - 989
- [30] k-anonymity Diagnosis Centre [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 47 - 63