共 50 条
- [41] Truthful Incentive Mechanisms for K-Anonymity Location Privacy 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2994 - 3002
- [43] Multidimensional K-anonymity partition method using entropy Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (06): : 1228 - 1231
- [44] Study on Privacy Protection Algorithm Based on K-Anonymity 2012 INTERNATIONAL CONFERENCE ON MEDICAL PHYSICS AND BIOMEDICAL ENGINEERING (ICMPBE2012), 2012, 33 : 483 - 490
- [45] A Topological k-Anonymity Model Based on Collaborative Multi-view Clustering ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT III, 2018, 11141 : 817 - 827
- [47] A New Cloaking Method Supporting both K-anonymity and L-diversity for Privacy Protection in Location-Based Services 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 79 - 85
- [48] K-Anonymity Algorithm Based on Multi Attribute Generalization 2017, Univ. of Electronic Science and Technology of China (46):
- [49] Study on Privacy Protection Algorithm Based on K-Anonymity 2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 1, 2011, : 312 - 315
- [50] Algorithm for k-anonymity based on rounded partition function Ruan Jian Xue Bao/Journal of Software, 2012, 23 (08): : 2138 - 2148