[1] |
Bapna S, Gangopadhyay A. A wavelet-based approach to preserve privacy for classification mining[J]. Decision Sciences, 2006, 37(4): 623-642.
|
[2] |
Muralidhar K, Parsa R, Sarathy R. A general additive data perturbation method for database security[J]. Management Science, 1999, 45(10): 1399-1415.
|
[3] |
Han J, Kamber M. Data mining: Concepts and techniques[M]. Amsterdam, Netherlands: Elsevier Science Publishers, 2006.
|
[4] |
Liu L, Wang J, Zhang J. Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving[C]//Proceedings of the 2008 IEEE International Conference on Data Mining Workshops. Piscataway, NJ, USA: IEEE, 2008: 27-35.
|
[5] |
Mukherjee S, Chen Z Y, Gangopadhyay A. A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms[J]. The VLDB Journal, 2006, 15(4): 293-315.
|
[6] |
Xu S T, Zhang J, Han D W, et al. Datadistortion for privacy protection in a terrorist analysis system[C]//Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics. Piscataway, NJ, USA: IEEE, 2005: 459-464.
|
[7] |
Xu S T, Zhang J, Han D W, et al. Singular value decomposition based data distortion strategy for privacy protection[J]. Knowledge and Information Systems, 2006, 10(3): 383-397.
|
[8] |
Evfrmievski A. Randomization in privacy preserving data mining[J]. SIGKDD Explorations Newsletter, 2002, 4(2): 43-48.
|
[9] |
Hay M, Miklau G, Jensen D, et al. Anonymizing social networks[R]. Amherst, MA, USA: University of Massachusetts, 2007.
|
[10] |
Zheleva E, Getoor L. Preserving the privacy of sensitive relationships in graph data[C]//Proceedings of the 1st ACM SIGKDD International Conference on Privacy, Security, and Trust in KDD. New York, NY, USA: ACM, 2007: 153-171.
|
[11] |
Zhou B, Pei J. Preserving privacy in social networks against neighborhood attack[C]//Proceedings of the 24th International Conference on Data Engineering. New York, NY, USA: ACM, 2008: 506-515.
|
[12] |
Tang J, Zhang D, Yao L M. Social network extraction of academic researchers[C]//Proceedings of 2007 IEEE International Conference on Data Mining. Piscataway, NJ, USA: IEEE, 2007: 292-301.
|
[13] |
李锋.面向数据挖掘的隐私保护方法研究[D].上海:上海交通大学,2008. Li F. Research on privacy preserving methods for data mining[D]. Shanghai: Shanghai Jiaotong University, 2008.
|
[14] |
杨维嘉.在数据挖掘中保护隐私信息的研究[D].上海:上海交通大学,2008. Yang W J. Research on Privacy Preserving Data Mining[D]. Shanghai: Shanghai Jiaotong University, 2008.
|
[15] |
Cormen T H, Leiserson C E, Rivest R L. Introduction to algorithms[ M]. 1st ed. Cambridge, MA, USA: MIT Press, 1990.
|
[16] |
Stigler S M. Statistics on the table[M]. Cambridge, Massachusetts, USA:Harvard University Press, 1999.
|
[17] |
Agrawal R, Srikant R. Privacy-preserving data mining[C]// Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. New York, NY, USA: ACM, 2000: 439-450.
|