共 50 条
- [41] Definition and Efficient Construction of Encrypted k-anonymization Scheme PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 293 - 300
- [42] Efficient k-Anonymization through Constrained Collaborative Clustering 2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 405 - 411
- [45] Towards a more reasonable generalization cost metric for k-anonymization FLEXIBLE AND EFFICIENT INFORMATION HANDLING, 2006, 4042 : 258 - 261
- [46] Counter Deanonymization Query: H -index Based k-Anonymization Privacy Protection for Social Networks SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 809 - 812
- [47] Optimization algorithm for k-anonymization of datasets with low information loss International Journal of Information Security, 2018, 17 : 631 - 644
- [49] A Top-Down k-Anonymization Implementation for Apache Spark 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4513 - 4521
- [50] NESTGate Realizing Personal Data Protection with k-Anonymization Technology FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 37 - 42