[1] |
丁丽萍, 卢国庆 . 面向频繁模式挖掘的差分隐私保护综述[J]. 通信学报, 2014,35(10): 200-209.
|
|
DING L P , LU G Q . Survey of differential privacy in frequent pat-tern mining[J]. Journal on Communication, 2014,35(10): 200-209.
|
[2] |
张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949.
|
|
ZHANG X F , MENG X F . Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014,37(4): 927-949.
|
[3] |
SUN C J , FU Y , ZHOU J L , et al. Personalized privacy-preserving frequent itemset mining using randomized response[J]. The Scien-tific World Journal, 2014(3): 686151.
|
[4] |
TASSA T . Secure mining of association rules in horizontally dis-tributed databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(4): 970-983.
|
[5] |
KESHAVAMURTHY B H , KHAN A M , TOSHNIWAL D . Privacy preserving association rule mining over distributed databases using genetic algorithm[J]. Neural Comput & Applic, 2013,22(1): 351-364.
|
[6] |
LIN C W , ZHANG B B , YANG K T , et al. Efficiently hiding sensi-tive itemsets with transaction deletion based on genetic algo-rithms[J]. The Scientific World Journal, 2014: 398269.
|
[7] |
ANEKRITMONGKOL S , KASEMSAN K . SQL model in language encapsulation and compression technique for association rules mining[J]. International Journal of Intellectual Property Manage-ment, 2013,4(1): 65-75.
|
[8] |
SEKHAVAT Y A , FATHIAN M . frequent itemsets in the presence of malicious participants[J]. The Institution of Engineer-ing and Technology, 2010,4(2): 80-92.
|
[9] |
LI Y P , CHEN M H , LI Q W , et al. Enabling multilevel trust in privacy preserving data mining[J]. IEEE Transactions on Knowl-edge and Data Engineering, 2012,24(9): 1598-1612.
|
[10] |
TASSA T . Secure mining of association rules in horizontally dis-tributed databases[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(4): 970-983.
|
[11] |
BHANUMATHI S , SAKTHIVEL A . A new model for privacy preserving multiparty collaborative data mining[C]// International Conference on Circuits, Power and Computing Technologies.c 2013: 845-850.
|
[12] |
ZHANG F , RONG C M , ZHAO G , et al. Privacy-preserving two-party distributed association rules mining on horizontally parti-tioned data[C]// International Conference on Cloud Computing and Big Data.c 2013: 633-640.
|
[13] |
HAJIAN S , DOMINGO-FERRER J , FARRàS O . Generaliza-tion-based privacy preservation and discrimination prevention in data publishing and mining[J]. Data Mining & Knowledge Discov-ery, 2014,28: 1158-1188.
|
[14] |
李顺东, 王道顺 . 基于同态加密的高效多方保密计算[J]. 电子学报, 2013,41(4): 798-803.
|
|
LI S D , WANG D S . Efficient secure multiparty computation based on homomorphic encryption[J]. Acta Electronica Sinica, 2013,41(4): 798-803.
|