共 25 条
[1]
Baghel R, 2013, INT CONF CONTEMP, P124, DOI 10.1109/IC3.2013.6612175
[2]
Blum A., 2005, PODS'05: Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, P128, DOI DOI 10.1145/1065167.1065184
[3]
[丁丽萍 Ding Liping], 2014, [通信学报, Journal on Communications], V35, P200
[4]
Dwork C., 2006, P 3 THEOR CRYPT C TC, P363
[5]
Differential privacy: A survey of results
[J].
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS,
2008, 4978
:1-19
[6]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[7]
Friedman A., 2010, P 16 ACM SIGKDD INT, P493
[8]
Gu B., IEEE T NEURAL NETWOR, DOI [10.1109/TNNL.2016.2544779, DOI 10.1109/TNNL.2016.2544779]
[9]
Itten I. H., 2011, DATA MINING PRACTICA
[10]
Liu Xiang-Yu, 2014, Journal of Software, V25, P576