1. Sweeney L. K-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowlege-based Systems, 2002, 10(5): 557-570
2. Machanavajjhala A, Kifer D, Gehrke J, et al. L-diversity: privacy beyond k-anonymity. Proceedings of the International Conference on Data Engineering (ICDE’06), Apr 3-7, 2006, Atlanta, GA, USA. Piscataway, NJ, USA: IEEE, 2006: 24
3. Ruppert D, Wand M P. Multivariate locally weighted least squares regression. Annals of Statistics,1994, 22(3): 1346-1370
4. Narayanan A, Shmatikov V. De-anonymizing social networks. Proceedings of the IEEE 30th Symposium on Security and Privacy, May 17-20, 2009, Berkeley, CA, USA. Piscataway, NJ, USA: IEEE, 2009: 173-187
5. Zhou B, Pei J. Preserving privacy in social networks against neighborhood attacks. Proceedings of the IEEE 24th International Conference on Data Engineering (ICDE’08), Apr 7-12, 2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2008: 506-515
6. Rechert K, Wohlgemuth S, Echizen I, et al. User centric privacy in mobile communication scenarios. Proceedings of the IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT’11), Jul 18-21, 2011, Munich, Germany. Piscataway, NJ, USA: IEEE, 2011: 202-207
7. Machanavajjhala A, Kifer D, Abowd J, et al. Privacy: theory meets practice on the map. Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE’08), Apr 7-12, 2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2008: 277-286
8. Li T C, Li N H, Zhang J. Modeling and integrating background knowledge in data anonymization. Proceedings of the 25th IEEE International Conference on Data Engineering (ICDE’09), Mar 29-Apr 2, 2009, Shanghai, China. Piscataway, NJ, USA: IEEE, 2009: 6-17
9. Atzmueller M, Puppe F. A methodological view on knowledge-intensive subgroup discovery. Proceedings of the 15th International Conference on Managing Knowledge in a World of Networks (EKAW’06), Oct 2-6, 2006, Podebrady, Czech Republic. 2006: 318-325
10. Agrawal D, Kesdogan D. Measuring anonymity: the disclosure attack. IEEE Security and Privacy, 2003, 1(6): 27-34
11. Martin D, Kifer D, Machanavajjhala A, et al. Worst-case background knowledge for privacy-preserving data publishing. Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE’07), Apr 15-20, 2007, Istanbul, Turkey. Piscataway, NJ, USA: IEEE, 2007: 126-135
12. Du W L, Teng Z X, Zhu Z T. Privacy-maxent: integrating background knowledge in privacy quantification. Proceedings of the 34th ACM SIGMOD International Conference on Management of Data (SIGMOD’08), Jun 9-12, 2008, Vancouver, Canada. New York, NY, USA: ACM, 2008: 459-472
13. Masoumzadeh A, Joshi J. Preserving structural properties in edge-perturbing anonymization techniques for social networks. IEEE Transactions on Dependable and Secure Computing, 2012, 9(6): 877-889
14. Ma C, Yau D, Yip N, et al. Privacy vulnerability of published anonymous mobility traces. IEEE/ACM Transactions on Networking, 2012, 21(3): 720-733
15. Mahmoud M, Shen X M. A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10): 1805-1818
16. Barker S, Genovese V. Access control with privacy enhancements a unified approach. IEEE Transactions on Dependable and Secure Computing, 2012, 9(5): 670-683
17. Ghinita G, Kalnis P, Tao Y F. Anonymous publication of sensitive transactional data. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(2): 161-174
18. Li Y P, Chen M H. Enabling multilevel trust in privacy preserving data mining. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(9): 1598-1612
19. Li T C, Li N H. Injector: Mining background knowledge for data anonymization. Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE’08), Apr 7-12, 2008, Cancun, Mexico. Piscataway, NJ, USA: IEEE, 2009: 446-455
20. Agrawal R, Srikant R. Privacy-preserving data mining. Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD’00), May 16-18, 2000, Dallas, TX, USA. New York, NY, USA: ACM, 2000: 439-462
21. Wand M, Jones M. Kernel smoothing. London, UK: Chapman & Hall/CRC, 1995 |