共 140 条
[2]
Protecting online social networks profiles by hiding sensitive data attributes
[J].
4TH SYMPOSIUM ON DATA MINING APPLICATIONS (SDMA2016),
2016, 82
:20-27
[4]
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[5]
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
[7]
Agrawal D., 2001, Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '01), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[8]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[10]
Akyildiz I. F., 2004, Ad Hoc Networks, V2, P351, DOI DOI 10.1016/J.ADH0C.2004.04.003