[1] DWORK C. Differential privacy[C]//ICALP 2006:Proceedings of the 2006 International Colloquium on Automata, Languages, and Programming. Berlin:Springer, 2006:1-12. [2] 吴伟民,黄焕坤.基于差分隐私保护的DP-DBScan聚类算法研究[J].计算机工程与科学,2015,37(4):830-834.(WU W M, HUANG H K. Study on DP-DBSCAN clustering algorithm based on differential privacy protection[J]. Computer Engineering and Science, 2015, 37(4):830-834.) [3] NG R T, HAN J. Efficient and effective clustering methods for spatial data mining[C]//Proceedings of the 1994 International Conference on Very Large Data Bases. San Francisco:Morgan Kaufmann, 1994:144-155. [4] ANKERST M, BREUNIG M M, KRIEGEL H P, et al. OPTICS:ordering points to identify the clustering structure[J]. ACM SIGMOD Record, 1999, 28(2):49-60. [5] BLUM A, DWORK C, MCSHERRY F, et al. Practical privacy:the SuLQ framework[C]//Proceedings of the Twenty-Fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. New York:ACM, 2005:128-138. [6] NISSIM K, RASKHODNIKOVA S, SMITH A. Smooth sensitivity and sampling in private data analysis[C]//Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. New York:ACM, 2007:75-84. [7] DWORK C. A firm foundation for private data analysis[J]. Communications of the ACM, 2011, 54(1):86-95. [8] 李杨,郝志峰,温雯,等.差分隐私保护k-means聚类方法研究[J].计算机科学,2013,40(3):287-290.(LI Y, HAO Z F, WEN W, et al. Study on clustering method of differential privacy protection k-means[J]. Computer Science, 2013, 40(3):287-290.) [9] DWORK C, MCSHERRY F, NISSIM K. Calibrating noise to sensitivity in private data analysis[J]. Proceedings of the VLDB Endowment, 2012, 7(8):637-648. [10] MCSHERRY F, TALWAR K. Mechanism design via differential privacy[C]//FOCS '07:Proceedings of the 2007 IEEE Symposium on Foundations of Computer Science. Piscataway, NJ:IEEE, 2007:94-103. [11] HAY M, RASTOGI V, MIKLAU G, et al. Boosting the accuracy of differentially private histograms through consistency[J]. Proceedings of the 36th VLDB Endowment, 2010, 3(1/2):1021-1032. [12] PENG S, YANG Y, ZHANG Z, et al. DP-tree:indexing multi-dimensional data under differential privacy (abstract only)[C]//SIGMOD '12:Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2012:864. [13] MCSHERRY F D. Privacy integrated queries:an extensible platform for privacy-preserving data analysis[J]. Communications of the ACM, 2010, 53(9):89-97. [14] 何贤芒,王晓阳,陈华辉,等.差分隐私保护参数ε的选取研究[J].通信学报,2015,36(12):124-130.(HE X M, WANG X Y, CHEN H H, et al. Study on the selection of differential privacy parameters ε[J]. Journal on Communications, 2015, 36(12):124-130.) [15] LEE J, CLIFTON C. How much is enough? choosing ε for differential privacy[C]//ISC 2011:Proceedings of the 2011 International Conference on Information Security. Berlin:Springer, 2011:325-340. [16] HARDT M, TALWAR K. On the geometry of differential privacy[C]//Proceedings of the 2010 ACM Symposium on Theory of Computing. New York:ACM, 2010:705-714. [17] XIAO X, BENDER G, HAY M, et al. iReduct:differential privacy with reduced relative errors[C]//SIGMOD 2011:Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data. New York:ACM, 2011:229-240. [18] LI Y, ZHANG Z, WINSLETT M, et al. Compressive mechanism:utilizing sparse representation in differential privacy[C]//Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society. New York:ACM, 2011:177-182. [19] XIAO X, WANG G, GEHRKE J. Differential privacy via wavelet transforms[C]//Proceedings of the 2010 IEEE 26th International Conference on Data Engineering. Piscataway, NJ:IEEE, 2010:225-236. [20] CHEN R, ACS G, CASTELLUCCIA C. Differentially private sequential data publication via variable-length n-grams[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM, 2012:638-649. [21] 曾依灵,许洪波,白硕.改进的OPTICS算法及其在文本聚类中的应用[J].中文信息学报,2008,22(1):51-55.(ZENG Y L, XU H B, BAI S. Improved OPTICS algorithm and its application in text clustering[J]. Journal of Chinese Information Processing, 2008, 22(1):51-55.) [22] MCSHERRY F D. Privacy integrated queries:an extensible platform for privacy-preserving data analysis[J]. Communications of the ACM, 2010, 53(9):89-97. [23] ROY I, SETTY S T V, KILZER A, et al. Airavat:security and privacy for MapReduce[C]//NSDI 2010:Proceedings of the 2010 USENIX Symposium on Networked Systems Design and Implementation. Berkeley, CA:USENIX Association, 2010:297-312. [24] ERLINGSSON U, PIHUR V, KOROLOVA A. RAPPOR:randomized aggregatable privacy-preserving ordinal response[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:1054-1067. [25] 程呈.基于差分隐私的兴趣点推荐系统的设计与分析[D].成都:电子科技大学,2015.(CHENG C. Design and analysis of point of interest recommendation system based on differential privacy[D]. Chengdu:University of Electronic Science and Technology of China, 2015.) [26] 王越.基于差分隐私的社交网络隐私保护方法研究[D]. 哈尔滨:哈尔滨工业大学,2016.(WANG Y. Study on privacy protection method of social network based on differential privacy[D]. Harbin:Harbin Institute of Technology, 2016.) |