共 37 条
[1]
Aggarwal CC, 2005, P 31 INT C VERY LARG, P901, DOI DOI 10.5555/1083592.1083696
[2]
Alvim Mario S., 2012, Formal Aspects of Security and Trust. 8th International Workshop, FAST 2011. Revised Selected Papers, P39, DOI 10.1007/978-3-642-29420-4_3
[3]
BACCHUS F, 1992, AAAI-92 PROCEEDINGS : TENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, P602
[4]
Balle B, 2018, PR MACH LEARN RES, V80
[5]
Brickell J., 2008, P 14 ACM SIGKDD INT, P70, DOI [10.1145/1401890.1401904, DOI 10.1145/1401890.1401904]
[6]
Clifton C, 2013, I C DATA ENGIN WORKS, P88, DOI 10.1109/ICDEW.2013.6547433
[8]
A critique of k-anonymity and some of its enhancements
[J].
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY,
2008,
:990-+
[10]
Duchi JC, 2013, ANN ALLERTON CONF, P1592, DOI 10.1109/Allerton.2013.6736718