共 50 条
[33]
Anonymization Technique For Privacy Preservation In Social Networks
[J].
2021 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER TECHNOLOGIES AND OPTIMIZATION TECHNIQUES (ICEECCOT),
2021,
:131-136
[34]
Fundamental Limits of Location Privacy using Anonymization
[J].
2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS),
2017,
[35]
Practical Anonymization for Protecting Privacy in Combinatorial Maps
[J].
2014 15TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT 2014),
2014,
:119-123
[36]
Limits of Location Privacy under Anonymization and Obfuscation
[J].
2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT),
2017,
:764-768
[37]
Data Anonymization for Privacy Aware Machine Learning
[J].
MACHINE LEARNING, OPTIMIZATION, AND DATA SCIENCE,
2019, 11943
:725-737
[38]
Situating Anonymization Within a Privacy Risk Model
[J].
2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON),
2012,
:651-656
[39]
Efficient k-Anonymization through Constrained Collaborative Clustering
[J].
2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI),
2018,
:405-411
[40]
Definition and Efficient Construction of Encrypted k-anonymization Scheme
[J].
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP),
2019,
:293-300