[1] 方跃坚,朱锦钟,周文,等.数据挖掘隐私保护算法研究综述[J].信息网络安全,2017(2):6-11.(FANG Y J, ZHU J Z, ZHOU W, et al. A Survey on data mining privacy protection algorithms[J]. Information Network Security, 2017(2):6-11.) [2] SWEENEY L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570. [3] DWORK C, MCSHERRY F, NISSIM K. Calibrating noise to sensitivity in private data analysis[C]//TCC 2006:Proceedings of the Third Conference on Theory of Cryptography, LNCS 3876. Berlin:Springer, 2006:265-284. [4] REN J, XIONG J B, YAO Z Q, et al. DPLK-means:a novel differential privacy K-means mechanism[C]//DSC 2017:Proceedings of the 2017 IEEE Second International Conference on Data Science in Cyberspace. Piscataway, NJ:IEEE, 2017:133-139. [5] 任君,熊金波,姚志强.基于差分隐私模型的云数据副本安全控制方案[J].网络与信息安全学报,2017,3(5):38-46.(REN J, XIONG J B, YAO Z Q. Security control scheme for cloud data copy based on differential privacy model[J]. Chinese Journal of Network and Information Security, 2017, 3(5):38-46.) [6] SIMMONS S, BERGER B. Realizing privacy preserving genome-wide association studies[J]. Bioinformatics, 2016, 32(9):1293-1300. [7] HAY M, RASTOGI V, MIKLAU G, et al. Boosting the accuracy of differentially private histograms through consistency[J]. Proceedings of the VLDB Endowment, 2009, 3(1/2):1021-1032. [8] XIAO X, WANG G, GEHRKE J. Differential privacy via wavelet transforms[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(8):1200-1214. [9] CHEN R, FUNG B C M, DESAI B C. Differentially private transit data publication:a case study on the Montreal transportation system[C]//Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2012:213-221. [10] CHEN R, ACS G, CASTELLUCCIA C. Differentially private sequential data publication via variable-length n-grams[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. New York:ACM, 2012:638-649. [11] CORMODE G, PROCOPIUC C, SRIVASTAVA D, et al. Differentially private spatial decompositions[C]//Proceedings of the 28th International Conference on Data Engineering. Piscataway, NJ:IEEE, 2012:20-31. [12] ZHANG J D, GHINITA G, CHI Y C. Differentially private location recommendations in geosocial networks[C]//Proceedings of the 28th International Conference on Mobile Data Management. Washington, DC:IEEE Computer Society, 2014:59-68. [13] WANG J, LIU S, LI Y, et al. Differentially private spatial decompositions for geospatial point data[J]. China Communications, 2016, 13(4):97-107. [14] GENG Q, VISWANATH P. The optimal noise-adding mechanism in differential privacy[J]. IEEE Transactions on Information Theory, 2016, 62(2):925-951. [15] DWORK C, ROTH A. The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2014, 9(3/4):211-407. |