共 47 条
[31]
De-anonymizing Social Networks
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:173-187
[32]
Oliveira SRM, 2003, THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, P613
[33]
Papadimitriou Christos H., 1994, Computational complexity
[34]
Pasquier N, 1999, LECT NOTES COMPUT SC, V1540, P398
[35]
The Synthetic data vault
[J].
PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016),
2016,
:399-410
[36]
Distribution-based synthetic database generation techniques for itemset mining
[J].
9th International Database Engineering & Application Symposium, Proceedings,
2005,
:307-316
[37]
Ramesh Ganesh., 2003, P 22 ACM SIGMOD SIGA, P284, DOI DOI 10.1145/773153.773181
[38]
Sacca D, 2013, NUMBER MINIMAL HYPER
[39]
Shah A., 2016, INT J COMPUTER APPL, V137, P40