共 30 条
[1]
Muralidhar K., Sarathy R., Security of random data perturbation methods, ACM Trans on Database Systems, 24, 4, pp. 487-493, (1999)
[2]
Kargupta H., Datta S., Wang Q., Et al., On the privacy preserving properties of random data perturbation techniques, Proc of the 3rd Int Conf on Data Mining, pp. 99-106, (2003)
[3]
Chen K., Liu L., Privacy preserving data classification with rotation perturbation, Proc of the 5th Int Conf on Data Mining, (2005)
[4]
Aggarwal C.C., Philip S.Y., A condensation approach to privacy preserving data mining, Proc of Int Conf on Extending Database Technology, pp. 183-199, (2004)
[5]
Aggarwal C.C., Yu P.S., On static and dynamic methods for condensation-based privacy-preserving data mining, ACM Trans on Database Systems, 33, 1, pp. 41-79, (2008)
[6]
Evfimievski A., Srikant R., Agrawal R., Et al., Privacy preserving mining of association rules, Information Systems, 29, 4, pp. 343-364, (2004)
[7]
Zhang X., Wu Y., Wang X., Differential privacy data release through adding noise on average value[G], Network and System Security, pp. 417-429, (2012)
[8]
Dwork C., McSherry F., Nissim K., Et al., Calibrating noise to sensitivity in private data analysis[G], Theory of Cryptography, pp. 265-284, (2006)
[9]
Li M., Sampigethaya K., Huang L., Et al., Swing & swap: User-centric approaches towards maximizing location privacy, Proc of the 5th ACM Workshop on Privacy in Electronic Society, pp. 19-28, (2006)
[10]
Sweeney L., k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 5, pp. 557-570, (2002)