共 50 条
- [21] How anonymous is k-anonymous? Look at your quasi-ID SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 1 - +
- [23] k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (07): : 1625 - 1635
- [24] K-anonymous multi-party secret handshakes FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 72 - +
- [25] Local Differential Privacy with K-anonymous for Frequency Estimation 2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5819 - 5828
- [27] Generating k-Anonymous Microdata by Fuzzy Possibilistic Clustering DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT II, 2017, 10439 : 3 - 17
- [28] Efficient Algorithms for K-Anonymous Location Privacy in Participatory Sensing 2012 PROCEEDINGS IEEE INFOCOM, 2012, : 2399 - 2407
- [29] k-Anonymous Microdata Release via Post Randomisation Method ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 225 - 241
- [30] Finding the Provenance of k-anonymous Data and Adding it to Association-rule Mining PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 117 - 122