L Sweeney.K-anonymity:A model for protecting privacy[J].International Journal of Uncertainty Fuzziness and Knowledge Based Systems,2002,10(5):557-570.
[2]
王波,杨静.一种基于逆聚类的个性化隐私匿名方法[J].电子学报,2012,40(5):883-890. Wang Bo,Yang Jing.A personalized privacy anonymous method based on inverse clustering[J].Acta Electronica Sinica,2012,40(5):883-890.(in Chinese)
[3]
S Lee,M G Genton,R B Arellano-Valle.Perturbation of numerical confidential data via skew-t distributions[J].Management Science,2010,56(2):318-333.
C C Aggarwal.On randomization,public information and the curse of dimensionality[A].Proceedings of 23rd International Conference on Data Engineering[C].Istanbul:IEEE,2007,136-145.
[6]
K Liu,H Kargupta,J Ryan.Random projection-based multiplicative data perturbation for privacy preserving distributed data mining[J].IEEE Transactions on Knowledge and Data Engineering,2006,18(1):92-106.
[7]
C C Aggarwal,P S Yu.On privacy-preservation of text and sparse binary data with sketches[A].Proceedings of the Seventh SIAM International Conference on Data Mining[C].Minnesota:SIAM,2007.57-67.
[8]
W B Johnson,J Lindenstrauss.Extensions of lipschitz mappings into a hilbert space[J].Contemporary Mathematics,1984,26:189-206.
[9]
M Dietzfelbinger,T Hagerup,J Katajainen,M Penttonen.A reliable randomized algorithm for the closest-pair problem[J].Journal of Algorithms,1997,25(1):19-51.
[10]
C C Aggarwal,P S Yu.A General Survey of Privacy-preserving Data Mining Models and Algorithms[M].NewYork:Springer US,2008.11-52.
[11]
韩建民,岑婷婷,虞慧群,等.数据表k-匿名化的微聚集算法研究[J].电子学报,2008,36(10):2021-2029. Han Jian-min,Cen Ting-ting,Yu Hui-qun,et al.Research in microaggregation algorithms for k-anonymization[J].Acta Electronica Sinica,2008,36(10):2021-2029.(in Chinese)
[12]
李光,王亚东.一种改进的基于奇异值分解的隐私保持分类挖掘方法[J].电子学报,2012,40(4):739-744. Li Guang,Wang Ya-Dong.An improved privacy-preserving classification mining method based on singular value decomposition[J].Acta Electronica Sinica,2012,40(4):739-744.(in Chinese)
[13]
K K Chen,L Liu.Geometric data perturbation for privacy preserving outsourced data mining[J].Knowledge and Information Systems,2011,29(3):657-695.
[14]
Y Sang,H Shen,H Tian.Reconstructing data perturbed by random projections when the mixing matrix is known[A].Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases[C].Berlin:Springer,2009.334-349.
[15]
P Anna,P Rasmus.Uniform hashing in constant time and optimal space[J].SIAM Journal on Computing,2008,38(1):85-96.