[1] 冯登国, 张敏, 李昊.大数据安全与隐私保护[J]. 计算机学报, 2014, 37(1):246-258.(FENG D G, ZHANG M, LI H. Big data security and privacy protection [J]. Chinese Journal of Computers, 2014, 37(1):246-258.) [2] 张啸剑, 孟小峰.面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014, 37(4):927-949.(ZHANG X J, MENG X F. Differential privacy in data publication and analysis [J]. Chinese Journal of Computers, 2014, 37(4):927-949.) [3] 欧阳佳, 印鉴.一种有效的差分隐私事务数据发布策略[J]. 计算机研究与发展, 2014, 51(10):2195-2205.(OUYANG J, YIN J. An effective eifferential privacy transaction data publication strategy [J]. Journal of Computer Research and Development, 2014, 51(10):2195-2205.) [4] 熊平, 朱天倩.一种面向决策树构建的差分隐私保护算法[J]. 计算机应用研究, 2014, 31(10):108-3112.(XIONG P, ZHU T Q. Differential privacy data publishing algorithm for building decision tree[J]. Application Research of Computers, 2014, 31(10):3108-3112.) [5] 薛寿豪, 张正道.基于箱聚类的差分隐私直方图发布方法研究[J]. 计算机应用研究, 2014, 31(12):3700-3710.(XUE S G, ZHANG Z D. Research of differential privacy histogram publishing based on clustering bins[J]. Application Research of Computers, 2014, 31(12):3700-3710.) [6] 熊平, 朱天清, 王晓峰.差分隐私保护及其应用[J]. 计算机学报, 2014, 37(1):101-122.(XIONG P, ZHU T Q, WANG X F. A survey on differential privacy and application[J]. Chinese Journal of Computers, 2014, 37(1):101-122.) [7] DWORK C. Differential privacy in new setting[C]//SODA 2010: Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics, 2010:174-183. [8] DWORK C. The promise of differential privacy: a tutorial on algorithmic techniques[C]//Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science. Piscataway, NJ: IEEE, 2011:1-2. [9] 王智慧, 许俭.一种基于聚类的数据匿名方法[J]. 软件学报, 2010, 21(4):680-693.(WANG Z H, XU J. Clustering-based approach for data anonymization[J]. Journal of Software, 2010, 21(4):680-693.) [10] 付艳艳, 张敏, 冯登国, 等.基于节点分割的社交网络属性隐私保护[J]. 软件学报, 2014, 25(4):768-780.(FU Y Y, ZHANG M, FENG D G, et al. Attribute privacy preservation in social networks based on node anatomy[J]. Journal of Software, 2014, 25(4):768-780.) [11] 付艳艳, 付浩, 谢幸, 等.社交网络匿名与隐私保护[J]. 中国计算机学会通讯, 2014(6):51-58.(FU Y Y, FU H, XIE X, et al. The social network anonymity and privacy protection[J]. Communications of the CCF, 2014(6):51-58.) [12] 贺玲, 蔡益朝.杨征, 等.高维数据空间的一种网格划分方法[J]. 计算机工程与应用, 2011, 47(5):152-153.(HE L, CAI Y C, YANG Z, et al. Grid-based division approach for high-dimensional data space[J]. Computer Engineering and Applications, 2011, 47(5):152-153.) [13] 夏赞珠, 韩建民, 于娟, 等.用于实现(k, e)-匿名模型的MDAV算法[J]. 计算机工程, 2010, 36(15):159-161.(XIA Z Z, HAN J M, YU J, et al. MDAV algorithm for implementing (k, e)-anonymity model[J]. Computer Engineering, 2010, 36(15):159-161.) [14] BLUM A, DWORK C, McSHERRY F, et al. Practical privacy: the SuLQ framework[C]//PODS 2005: Proceedings of the Twenty-Fourth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. New York: ACM, 2005: 128-138. [15] CLIFTON C, KANTARCIOGLU M, VAIDYA J, et al. Tools for privacy preserving distributed data mining[J]. ACM SIGKDD Explorations Newsletter, 2002, 4(2):28-34. [16] DOMINGO-FERRER J. Microaggregation for database and location privacy[C]//NGITS 2006: Proceedings of the 6th International Conference on Next Generation Information Technologies and Systems, LNCS 4032. Piscataway, NJ: IEEE, 2006: 106-116. |