|
基于推荐的社交媒体数据发布的隐私保护
|
Abstract:
[1] | Salamatian, S., Zhang, A., Calmon, F.D.P., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P. and Taft, N. (2013) How to Hide the Elephant- or the Donkey- in the Room: Practical Privacy against Statistical Inference for Large Data. https://doi.org/10.1109/GlobalSIP.2013.6736867 |
[2] | Yang, D., Zhang, D., Qu, B., et al. (2016) PrivCheck: Privacy-Preserving Check-in Data Publishing for Personalized Location Based Services. In: Proceedings of 2016 ACM International Joint Conference, ACM, New York. https://doi.org/10.1145/2971648.2971685 |
[3] | Li, C., Shirani-Mehr, H. and Yang, X.C. (2007) Protecting Individual Information against Inference Attacks in Data Publishing. Advances in Databases: Concepts, Systems and Applications, Proceedings of 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, 9-12 April 2007. https://doi.org/10.1007/978-3-540-71703-4_37 |
[4] | Chen, B.-C., Kifer, D., LeFevre, K. and Machanavajjhala, A. (2009) Privacy-Preserving Data Publishing. Foundations and Trends in Databases, 2, 1-167. https://doi.org/10.1561/1900000008 |
[5] | 李杨, 温雯, 谢光强. 差分隐私保护研究综述[J]. 计算机应用研究, 2012, 29(9): 3201-3205. |
[6] | Sankar, L., Rajagopalan, S.R. and Poor, H.V. (2013) Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. IEEE Transactions on Information Forensics and Security, 8, 838-852. https://doi.org/10.1109/TIFS.2013.2253320 |
[7] | Wagner, I. and Eckhoff, D. (2015) Technical Privacy Metrics: A Systematic Survey. arXiv preprint arXiv:1512.00327 |
[8] | 彭长根, 丁红发, 朱义杰, 等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016, 27(8): 1891-1903. |
[9] | Bhamidipati, S., Fawaz, N., Kveton, B. and Zhang, A. (2015) PriView: Personalized Media Consumption Meets Privacy against Inference Attacks. IEEE Software, 32, 53-59. https://doi.org/10.1109/MS.2015.100 |
[10] | Yang, D.Q., Qu, B.Q. and Philippe, C.M. (2019) Privacy-Preserving Social Media Data Publishing for Personalized Ranking-Based Recommendation. IEEE Transactions on Knowledge and Data Engineering, 31, 507-520. https://doi.org/10.1109/TKDE.2018.2840974 |
[11] | 何凌云, 洪良怡, 周洁, 陈湃卓, 赵序琦, 谢宇明, 刘功申. 社交网络隐私安全研究综述[J]. 信息技术, 2018(5): 153-159. |
[12] | du Pin Calmon, F. and Fawaz, N. (2012) Privacy against Statistical Inference. https://doi.org/10.1109/Allerton.2012.6483382 |
[13] | Guignard, D. (2019) Partial Differential Equations with Random Input Data: A Perturbation Approach. Archives of Computational Methods in Engineering, 26, 1313-1377. https://doi.org/10.1007/s11831-018-9275-2 |
[14] | Fan, W., He, J., Guo, M., Li, P., Han, Z. and Wang, R.C. (2020) Privacy Preserving Classification on Local Differential Privacy in Data Centers. Journal of Parallel and Distributed Computing, 135, 70-82. |