共 32 条
[1]
Agrawal S, 2005, PROC INT CONF DATA, P193
[2]
Brickell J., 2008, P 14 ACM SIGKDD INT, P70, DOI DOI 10.1145/1401890.1401904
[4]
Chaytor R, 2010, PROC VLDB ENDOW, V3, P608
[5]
Cormode G., 2011, PROC 17 ACM SIGKDD I, P1253
[6]
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data
[J].
PROCEEDINGS OF THE VLDB ENDOWMENT,
2010, 3 (01)
:1045-1056
[8]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[9]
Evfimievski A., 2003, PROC 22 ACM SIGMOD S, P211, DOI DOI 10.1145/773153.773174
[10]
Ganta Srivatsava Ranjit, 2008, SER KDD 08, P265, DOI DOI 10.1145/1401890.1401926