共 27 条
- [1] Ding L., Lu G., Survey of differential privacy in frequent pattern mining, Journal on Communications, 35, 10, pp. 200-209, (2014)
- [2] Yang S., Ma C., Random anonymity method for location privacy protection, Journal of Harbin Engineering University, 36, 3, pp. 374-378, (2015)
- [3] Zhang L., Ma C., Yang S., Et al., Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack, Journal of Harbin Engineering University, 38, 7, pp. 1173-1178, (2017)
- [4] Tu Z., Zhao K., Xu F., Et al., Protecting trajectory from semantic attack considering k-anonymity, l-diversity, and t-closeness, IEEE Transactions on Network and Service Management, 16, 1, pp. 264-278, (2019)
- [5] Ohm P., Broken promises of privacy: responding to the surprising failure of anonymization, UCLA Law Review, 57, pp. 1701-1777, (2010)
- [6] Toch E., Bettini C., Shmueli E., Et al., The privacy implications of cyber security systems: a technological survey, ACM Computing Surveys, 51, 2, (2018)
- [7] Dwork C., Differential privacy and the US census, Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (2019)
- [8] Stavropoulos E.C., Verykios V.S., Kagklis V., A transversal hypergraph approach for the frequent itemset hiding problem, Knowledge and Information Systems, 47, 3, pp. 625-645, (2016)
- [9] Wang N., Xiao X., Yang Y., Et al., PrivSuper: a superset-first approach to frequent itemset mining under differential privacy, Proceedings of the IEEE 33rd International Conference on Data Engineering, pp. 809-820, (2017)
- [10] Cheng X., Su S., Xu S., Et al., DP-Apriori: a differentially private frequent itemset mining algorithm based on transaction splitting, Computers & Security, 50, pp. 74-90, (2015)