共 43 条
[1]
Garofalakis M N, Gehrke J, Rastogi R., Querying and mining data streams: You only get one look a tutorial, Proceedings of the International Conference on Management of Data(SIGMOD), (2002)
[2]
Tanbeer S K, Ahmed C F, Jeong B, Lee Y., Sliding window-based frequent pattern mining over data streams, Information Sciences, 179, 22, pp. 3843-3865, (2009)
[3]
Dwork C, Roth A., The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, 9, 3, pp. 211-407, (2014)
[4]
Dwork C, McSherry F, Nissim K, Smith A D., Calibrating noise to sensitivity in private data analysis, Proceedings of the International Conference on Theory of Cryptography (TCC), pp. 265-284, (2006)
[5]
McSherry F, Talwar K., Mechanism design via differential privacy, Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS), pp. 94-103, (2007)
[6]
Nanavati N R, Jinwala D C., A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data, Security and Communication Networks, 8, 18, pp. 4407-4420, (2015)
[7]
Wong W K, Cheung D W, Et al., Security in outsourcing of association rule mining, Proceedings of the International Conference on Very Large Data Bases (VLDB), pp. 111-122, (2007)
[8]
Wong W K, Cheung D W, Et al., An audit environment for outsourcing of frequent itemset mining, Proceedings of the VLDB Endowment (PVLDB), 2, 1, pp. 1162-1172, (2009)
[9]
Atzori M, Bonchi F, Et al., Anonymity preserving pattern discovery, Proceedings of the VLDB Endowment, 17, 4, pp. 703-727, (2008)
[10]
Loukides G, Gkoulalas-Divanis A, Shao Jian-Hua, Efficient and flexible anonymization of transaction data, Knowledge and Information Systems, 36, 1, pp. 153-210, (2013)