A journey on privacy protection strategies in big data
暂无分享,去创建一个
[1] Stan Matwin,et al. Personal Privacy Protection in Time of Big Data , 2016, Challenges in Computational Statistics and Data Mining.
[2] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[3] Athanasios V. Vasilakos,et al. Energy Big Data Analytics and Security: Challenges and Opportunities , 2016, IEEE Transactions on Smart Grid.
[4] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[5] Avita Katal,et al. Big data: Issues, challenges, tools and Good practices , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[6] Rolf Niedermeier,et al. The Effect of Homogeneity on the Complexity of k-Anonymity , 2011, FCT.
[7] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[8] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[9] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[10] Yong Xiang,et al. Protection of Big Data Privacy , 2016, IEEE Access.
[11] Yuguang Fang,et al. Privacy-Preserving Machine Learning Algorithms for Big Data Systems , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems.
[12] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[13] Athanasios V. Vasilakos,et al. The Quest for Privacy in the Internet of Things , 2016, IEEE Cloud Computing.
[14] Li Shuai,et al. Big Data security and privacy: A review , 2014, China Communications.