共 50 条
- [21] Protecting location privacy and query privacy: a combined clustering approach CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 3021 - 3043
- [22] Mining Entropy l-Diversity Patterns DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 2009, 5463 : 384 - 388
- [23] Protecting Trajectory From Semantic Attack Considering k-Anonymity, l-Diversity, and t-Closeness IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 264 - 278
- [24] The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks Knowledge and Information Systems, 2011, 28 : 47 - 77
- [25] Randomized Addition of Sensitive Attributes for l-diversity 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 350 - 360
- [26] L-Diversity Algorithm for Incremental Data Release APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 2055 - 2060