共 34 条
- [1] Agrawal R, 1994, P 20 INT C VER LARG
- [2] Bellare Mihir, 2012, P ACM CCS, P784, DOI 10.1145/2382196.2382279.
- [3] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
- [4] Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
- [5] Brijs T., 1999, P 5 ACM SIGKDD INT C, P254, DOI [DOI 10.1145/312129.312241, 10.1145/312129.312241]
- [7] Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
- [8] The Promise of Differential Privacy A Tutorial on Algorithmic Techniques [J]. 2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, : 1 - 2
- [9] Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 385 - 395