A Hybrid Method for k-Anonymization
暂无分享,去创建一个
[1] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[2] Josep Domingo-Ferrer,et al. Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond , 2008, PAIS '08.
[3] Jun-Lin Lin,et al. An efficient clustering method for k-anonymization , 2008, PAIS '08.
[4] Philip S. Yu,et al. Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).
[5] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[6] Catherine Blake,et al. UCI Repository of machine learning databases , 1998 .
[7] Hua Zhu,et al. Achieving k -Anonymity Via a Density-Based Clustering Method , 2007, APWeb/WAIM.
[8] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[9] Elisa Bertino,et al. Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.
[10] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Chieh-Yuan Tsai,et al. A k -Anonymity Clustering Method for Effective Data Privacy Preservation , 2007, ADMA.
[12] Grigorios Loukides,et al. Capturing data usefulness and privacy protection in K-anonymisation , 2007, SAC '07.