参考文献/References:
[1] Sweeney L.k-anonymity:a model for protecting privacy [J].International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[2] Samarati P,Sweeney L.Generalizing data to provide anonymity when disclosing information[C] //Proceedings of the Seventeenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems.Washington DC,USA,1998:188-196.
[3] Meyerson A,Williams R.On the complexity of optimal k-anonymity[C] //Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems.Paris,France,2004:223-228.
[4] Park H,Shim K.Approximate algorithms for k-anonymity[C] //Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data.Beijing,China,2007:67-78.
[5] LeFevre K,DeWitt D,Ramakrishnan R.Incognito:efficient full-domain k-anonymity[C] //Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data.Baltimore,Maryland,USA,2005:49-60.
[6] Machanavajjhala A,Gehrke J,Kifer D,et al.-diversity:privacy beyond k-anonymity[C] //Proceedings of the 22nd International Conference on Data Engineering.Atlanta,Georgia,USA,2006:24-35.
[7] Wong R,Fu A,Wang D,et al.Minimality attack in privacy preserving data publishing[C] //Proceedings of the 33rd International Conference on Very Large Data Bases.Vienna,Austria,2007:543-554.
[8] 杨晓春,刘向宇,王斌,等.支持多约束的k-匿名化方法[J].软件学报,2006,17(5):1222-1231.
Yang Xiaochun,Liu Xiangyu,Wang Bin,et al.k-anonymization approaches for supporting multiple constraints[J].Journal of Software,2006,17(5):1222-1231.(in Chinese)
[9] Xiao X,Tao Y.Anatomy:simple and effective privacy preservation[C] //Proceedings of the 32nd International Conference on Very Large Data Bases.Seoul,Korea,2006:139-150.
[10] Irvine machine learning repository [EB/OL].[2009-01-08].http://archive.ics.uci.edu/ml/.
相似文献/References:
[1]翁国庆,张森,倪巍伟.一种基于扰动的轨迹数据隐藏发布方法[J].东南大学学报(自然科学版),2014,44(1):51.[doi:10.3969/j.issn.1001-0505.2014.01.010]
Weng Guoqing,Zhang Sen,Ni Weiwei.A perturbation-based privacy preserving trajectory publication method[J].Journal of Southeast University (Natural Science Edition),2014,44(5):51.[doi:10.3969/j.issn.1001-0505.2014.01.010]