共 40 条
[1]
Adam N.R., Worthmann J.C., Security-control methods for statistical databases: A comparative study, ACM Computing Surveys (CSUR), 21, 4, pp. 515-556, (1989)
[2]
Aggarwal C.C., Philip S.Y., A General Survey of Privacy-Preserving Data Mining Models and Algorithms, (2008)
[3]
Agrawal D., Aggarwal C.C., On the design and quantification of privacy preserving data mining algorithms, Proceedings of the Twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 247-255, (2001)
[4]
Agrawal R., Srikant R., Privacy-preserving data mining, ACM Sigmod Record, 29, 2, pp. 439-450, (2000)
[5]
Alldrin N., Smith A., Turnbull D., Clustering with em and K-means, pp. 261-295, (2003)
[6]
Bapna S., Gangopadhyay A., A wavelet-based approach to preserve privacy for classification mining, Decision Sciences, 37, 4, pp. 623-642, (2006)
[7]
Brankovic L., Estivill-Castro V., Privacy issues in knowledge discovery and data mining, Australian Institute of Computer Ethics Conference, pp. 89-99, (1999)
[8]
Castano S., Fugini M.G., Martella G., Samarati P., Database Security, 1, (1995)
[9]
Catrina O., De Hoogh S., Secure multiparty linear programming using fixed-point arithmetic, Computer Security-ESORICS 2010, pp. 134-150, (2010)
[10]
Chakrabarti S., Et al., Data Mining Curriculum: A Proposal (Version 1. 0), (2006)