共 16 条
- [1] Agrawal R., Srikant R., Fast algorithms for mining association rules in large databases, Proc of the 20th Int Conf on Very Large Data Bases (VLDB'94), pp. 487-499, (1994)
- [2] Sweeney L., k-anonymity: A model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 5, pp. 557-570, (2002)
- [3] Atzori M., Bonchi F., Giannotti F., Et al., Anonymity preserving pattern discovery, The VLDB Journal, 17, 4, pp. 703-727, (2008)
- [4] Ganta S.R., Kasiviswanathan S.P., Smith A., Composition attacks and auxiliary information in data privacy, Proc of the 14th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining (KDD08), pp. 265-273, (2008)
- [5] Wong R.C.W., Fu A., Wang K., Et al., Can the utility of anonymized data be used for privacy breaches, ACM Trans on Knowledge Discovery from Data, 5, 3, pp. 16-39, (2011)
- [6] Dwork C., Differential privacy, Proc of the 33th Colloquium on Automata, Languages and Programming (ICALP06), pp. 1-12, (2006)
- [7] Dwork C., Differential privacy: A survey of results, Proc of the 5th Int Conf on Theory and Applications of Models of Computation (TAMC08), pp. 1-19, (2008)
- [8] Dwork C., Lei J., Differential privacy and robust statistics, Proc of the 41st Annual ACM Symp on Theory of Computing (STOC09), pp. 371-380, (2009)
- [9] Dwork C., The differential privacy frontier (extended abstract), Proc of the 6th Theory of Cryptography Conf (TCC09), pp. 496-502, (2009)
- [10] Bhaskar R., Laxman S., Smith A., Et al., Discovering frequent patterns in sensitive data, Proc of the 16th ACM SIGKDD Int Conf on Knowledge Discovery and Data Mining (KDD10), pp. 503-512, (2010)