[1] |
CHANG V , SUN G , LI J . Guest editorial: security and privacy for multimedia in the internet of things (IoT)[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
|
[2] |
SWEENEY L . K-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
|
[3] |
MACHANAVAJJHALA A , KIFER D , GEHRKE J . L-diversity: privacy beyond k -anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007,1(1): 3.
|
[4] |
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[J]. Proceedings of the Vldb Endowment, 2006,7(8): 637-648.
|
[5] |
DWORK C , ROTH A . The algorithmic foundations of differential privacy[M]. Boston: Now Publishers Inc. 2014
|
[6] |
GUZMAN J A D , THILAKARATHNA K , SENEVIRATNE A . Security and privacy approaches in mixed reality: a literature survey[J]. arXiv:1802.05797v2[cs.CR], 2018.
|
[7] |
LI N , LI T , VENKATASUBRAMANIAN S . Closeness: a new privacy measure for data publishing[J]. IEEE Transactions on Knowledge &Data Engineering, 2010(7): 943-956.
|
[8] |
GKOUNTOUNA O , TERROVITIS M . Anonymizing collections of tree-structured data[J]. IEEE Transactions on Knowledge & Data Engineering, 2015,27(8): 2034-2048.
|
[9] |
CLAU? S , SCHIFFNER S . Structuring anonymity metrics[C]// The Workshop on Digital Identity Management.ACM, 2006: 55-62.
|
[10] |
PENG C G , DING H F , ZHU Y J , et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8): 1891-1903.
|
[11] |
ZHANG W J , HUI L I . A differentially-private mechanism for multi-level data publishing[J]. Chinese Journal of Network & Information Security, 2015,1(1): 58-65.
|
[12] |
JORGENSEN Z , YU T , CORMODE G . Conservative or liberal? Personalized differential privacy[C]// International Conference on Data Engineering. IEEE, 2015: 1023-1034.
|
[13] |
WAGNER I , ECKHOFF D . Technical privacy metrics: a systematic survey[J]. Computer Science, 2018,51(3).
|
[14] |
SHANNON C E . A mathematical theory of communication[J]. Bell System Technical Journal, 1948,27(4): 379-423.
|
[15] |
BARNUM H , BARRETT J , CLARK L O , et al. Entropy and information causality in general probabilistic theories[J]. New Journal of Physics, 2012,14(12): 129401.
|
[16] |
ZHANG G , ZHANG Z , HE Y . Review on BP neural network applied in the textile and clothing Field[J]. Shandong Textile Science & Technology, 2013.
|
[17] |
PHELPS J , NOWAK G , FERRELL E . Privacy concerns and consumer willingness to provide personal information[J]. Journal of Public Policy & Marketing, 2013,19(1): 27-41.
|