[1] SWEENEY L. k-Anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570. [2] DWORK C. Differential privacy:a survey of results[C]//TAMC 2008:Proceedings of the 5th International Conference on Theory and Applications of Models of Computation, LNCS 4978. Berlin:Springer-Verlag, 2006:1-19. [3] CHEN R, FUNG B C M, DESAI B C, et al. Differentially private transit data publication:a case study on the montreal transportation system[C]//KDD'12:Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2012:213-221. [4] CHEN R, ACS G, CASTELLUCCIA C. Differentially private sequential data publication via variable-length n-grams[C]//CCS'12:Proceedings of the 7th ACM CCS Conference on Computer and Communications Security. New York:ACM, 2012:638-649. [5] BONOMI L, XIONG L. A two-phase algorithm for mining sequential patterns with differential privacy[C]//CIKM'13:Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management. New York:ACM, 2013:269-278. [6] XU S, SU S, CHENG X, et al. Differentially private frequent sequence mining via sampling-based candidate pruning[C]//ICDE'15:Proceedings of the 31st IEEE International Conference on Data Engineering. Washington, DC:IEEE Computer Society, 2015:1035-1046. [7] BHASKAR R, LAXMAN S, SMITH A, et al. Discovering frequent patterns in sensitive data[C]//KDD'10:Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2010:503-512. [8] LI N, QARDAJI W, SU D, et al. PrivBasis:frequent itemset mining with differential privacy[J]. Proceedings of the VLDB Endowment, 2012, 5(11):1340-1351. [9] 张啸剑,王淼,孟小峰.差分隐私保护下一种精确挖掘 top-k 频繁模式方法[J].计算机研究与发展,2014,51(1):104-114. (ZHANG X J, WANG M, MENG X F. An accurate method for mining top-k frequent pattern under differential privacy[J]. Journal of Computer Research and Development, 2014, 51(1):104-114). [10] ZENG C, NAUGHTON J F, CAI J-Y. On differentially private frequent itemset mining[J]. Proceedings of the VLDB Endowment, 2012, 6(1):25-36. [11] CHEN R, MOHAMMED N, FUNG B C M, et al. Publishing set-valued data via differential privacy[C]//Proceedings of the VLDB Endowment, 2011, 4(11):1087-1098. [12] LEE J, CLIFTONC W. Top-k frequent itemsets via differentially private FP-trees[C]//KDD'14:Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2014:930-940. [13] DWORK C, McSHERRY F, NISSIM K. Calibrating noise to sensitivity in private data analysis[C]//TCC 2006:Proceeding of the Third Theory of Cryptography Conferenc, LNCS 3876. Berlin:Springer-Verlag, 2006:265-284. [14] GHOSH A, ROUGHGARDEN T, SUNDARARAJAN M. Universally utility-maximizing privacy mechanisms[C]//STOC'09:Proceedings of the 41th ACM STOC Annual Symposium on Theory of Computing. New York:ACM, 2009:351-360. [15] AGRAWAL R, SRIKANT R. Fast algorithms for mining association rules[C]//VLDB'94:Proceedings of the 20th Conference of Very Large Data Bases. San Francisco, CA:Morgan Kaufmann Publishers, 1994:487-499. [16] ZHANG C, HAN J, SHOU L, et al. Splitter:mining fine-grained sequential patterns in semantic trajectories[J]. Proceedings of the VLDB Endowment, 2014, 7(9):769-780. |