共 50 条
- [3] k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (07): : 1625 - 1635
- [4] Finding the Provenance of k-anonymous Data and Adding it to Association-rule Mining PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 117 - 122
- [5] Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 3 - 17
- [6] Current Developments of k-Anonymous Data Releasing ELECTRONIC JOURNAL OF HEALTH INFORMATICS, 2008, 3 (01):
- [7] Utility Evaluation of K-anonymous Data by Microaggregation 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 381 - +