[1] 王豪,徐正全.面向轨迹聚类的差分隐私保护方法[J]. 华中科技大学学报(自然科学版), 2018, 46(1):32-36. (WANG H, XU Z Q. Differential privacy preserving method for trajectory clustering[J]. Journal of Huazhong University of Science & Technology (Natural Science Edition), 2018, 46(1):32-36.) [2] LI N, QARDAJI W, DONG S. On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy[C]// Proceedings of the 2012 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2012:32-33. [3] KELLARIS G, PAPADOPOULOS S. Practical differential privacy via grouping and smoothing[J]. Proceedings of the VLDB Endowment, 2013, 6(5):301-312. [4] SPIESSL S M, BECKER D A. Sensitivity analysis of a final repository model with quasi-discrete behaviour using quasi-random sampling and a metamodel approach in comparison to other variance-based techniques[J]. Reliability Engineering & System Safety, 2015, 134:287-296. [5] SARMA A D, LALL A, NANONGKAI D, et al. Randomized multi-pass streaming Skyline algorithms[J]. Proceedings of the VLDB Endowment, 2009, 2(1):85-96. [6] KANJ S, ABDALLAH F, DENEUX T, et al. Editing training data for multi-label classification with the k-nearest neighbor rule[J]. Pattern Analysis & Applications, 2016, 19(1):145-161. [7] ZHENG J, CHEN J, WANG H. Efficient geometric pruning strategies for continuous Skyline queries[J]. ISPRS International Journal of Geo-Information, 2017, 6(3):91. [8] 信俊昌, 王国仁. 无线传感器网络中Skyline节点连续查询算法[J]. 计算机学报, 2012, 35(11): 2415-2430.(XIN J C, WANG G R. Continuous Skyline nodes query processing over wireless sensor networks[J].Chinese Journal of Computers, 2012, 35(11):2415-2430.) [9] 雷婷,王涛,曲武,等.云环境下基于超球面投影分区的Skyline计算[J].计算机科学,2013,40(6):164-171. (LEI T, WANG T, QU W, et al. Distributed Skyline processing based on hypersphere projection partitioning on cloud environments[J]. Computer Science, 2013, 40(6): 164-171.) [10] ZHANG B, ZHOU S, GUAN J. Adapting Skyline computation to the MapReduce framework: algorithms and experiments[C]// Proceedings of the 16th International Conference on Database Systems for Advanced Applications. Berlin: Springer-Verlag, 2011:403-414. [11] GULZAR Y, ALWAN A A, SALLEH N, et al. A model for Skyline query processing in a partially complete database[J]. Advanced Science Letters, 2018, 24(2):400-407. [12] 康海燕, 马跃雷. 差分隐私保护在数据挖掘中应用综述[J]. 山东大学学报(理学版), 2017, 52(3):16-23.(KANG H Y, MA Y L. Survey on application of data mining via differential privacy[J]. Journal of Shandong University (Natural Science), 2017, 52(3):16-23.) [13] JORGENSEN Z, YU T, CORMODE G. Conservative or liberal? Personalized differential privacy[C]// Proceedings of the 2015 IEEE 31st International Conference on Data Engineering. Piscataway, NJ: IEEE, 2015:1023-1034. [14] WANG Y, ZHENG B. Preserving privacy in social networks against connection fingerprint attacks[C]// Proceedings of the 2015 IEEE 31st International Conference on Data Engineering. Piscataway, NJ: IEEE, 2015:54-65. |