[1] |
张华平, 孙梦姝, 张瑞琦 ,等. 微博博主的特征与行为大数据挖掘[J]. 中国计算机学会通讯, 2014,10(6): 36-43.
|
|
ZHANG H P , SUN M S , ZHANG R Q ,et al. Micro-blog blogger's characteristics and behavior big data mining[J]. Communications of the CCF, 2014,10(6): 36-43.
|
[2] |
张俊, 萧小奎 . 数据分享中的差分隐私保护[J]. 中国计算机学会通讯, 2014,10(6): 44-51.
|
|
ZHANG J , XIAO X K . Differential privacy protection based on data share[J]. Communications of the CCF, 2014,10(6): 44-51.
|
[3] |
刘雅辉, 张铁赢, 靳小龙 ,等. 大数据时代的个人隐私保护[J]. 计算机研究与发展, 2015,52(1): 229-247.
|
|
LIU Y H , ZHANG T Y , JIN X L ,et al. Personal privacy protection in the era of big data[J]. Journal of Computer Research and Development, 2015,52(1): 229-247.
|
[4] |
董诚, 林立, 金海 ,等. 医疗健康大数据:应用实例与系统分析[J]. 大数据, 2015(2):2015021.
|
|
DONG C , LIN L , JIN H ,et al. Big data in healthcare:applications and system analytics[J]. Big Data Research, 2015(2):2015021.
|
[5] |
俞国培, 包小源, 黄新霆 ,等. 医疗健康大数据的种类、性质及有关问题[J]. 医学信息学杂志, 2014,35(6): 9-12.
|
|
YU G P , BAO X Y , HUANG X T ,et al. Medical and health big data:types,characteristics and relevant issues[J]. Journal of Medical Intelligence, 2014,35(6): 9-12.
|
[6] |
刘向宇, 王斌, 杨晓春 . 社会网络数据发布隐私保护技术综述[J]. 软件学报, 2014,25(3): 576-590.
|
|
LIU X Y , WANG B , YANG X C . Survey on privacy preserving techniques for publishing social network data[J]. Journal of Software, 2014,25(3): 576-590.
|
[7] |
熊平, 朱天清, 王晓峰 . 差分隐私保护及其应用[J]. 计算机学报, 2014,37(1): 101-122.
|
|
XIONG P , ZHU T Q , WANG X F . A survey on differential privacy and applications[J]. Chinese Journal of Computers, 2014,37(1): 101-122.
|
[8] |
张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949.
|
|
ZHANG X J , MENG X F . Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014,37(4): 927-949.
|
[9] |
YU S . Big privacy:challenges and opportunities of privacy study in the age of big data[J]. IEEE Access, 2016(4): 2752-2763.
|
[10] |
彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903.
|
|
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8): 1891-1903.
|
[11] |
DWORK C , . Differential privacy[C]// The 33rd International Colloquium on Automata,Languages and Programming,July 10-14,2006,Venice,Italy. Venice:Springer-Verlag, 2006: 1-12.
|
[12] |
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[C]// The 3rd Conference on Theory of Cryptography,March 4-7,2006,New York,USA. New York:Springer, 2006: 265-284.
|
[13] |
MCSHERRY F , TALWAR K . Mechanism design via differential privacy[C]// The 48th Annual IEEE Symposium on Foundations of Computer Science,October 21-23,2007,Providence,USA. New Jersey:IEEE Press, 2007: 94-103.
|
[14] |
BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55.
|
[15] |
GHINITA G . Private queries and trajectory anonymization:a dual perspective on location privacy[J]. IEEE Transaction on Data Privacy, 2009,2(1): 3-19.
|
[16] |
KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6): 391-399.
|
[17] |
HUO Z . A survey of trajectory privacy preserving techniques[J]. Chinese Journal of Computers, 2011,34(10): 1820-1830.
|
[18] |
SHIN K G , JU X , CHEN Z ,et al. Privacy protection for users of locationbased services[J]. IEEE Wireless Communications, 2012,19(1): 30-39.
|
[19] |
张学军, 桂小林, 伍忠东 . 位置服务隐私保护研究综述[J]. 软件学报, 2015,26(9): 2373-2395.
|
|
ZHANG X J , GUI X L , WU Z D . Privacy preservation for location-based services:a survey[J]. Journal of Software, 2015,26(9): 2373-2395.
|
[20] |
周长利, 马春光, 杨松涛 . 路网环境下保护LBS位置隐私的连续KNN查询方法[J]. 计算机研究与发展, 2015,52(11): 2628-2644.
|
|
ZHOU C L , MA C G , YANG S T . Location privacy-preserving method for lbs continuous knn query in road networks[J]. Journal of Computer Research and Development, 2015,52(11): 2628-2644.
|
[21] |
倪巍伟, 陈萧, 马中希 . 支持偏好调控的路网隐私保护k近邻查询方法[J]. 计算机学报, 2015,38(4): 884-896.
|
|
NI W W , CHEN X , MA Z X . Location privacy preserving k nearest neighbor query method on road network in presence of user's preference[J]. Chinese Journal of Computers, 2015,38(4): 884-896.
|
[22] |
倪巍伟, 陈萧 . 保护位置隐私近邻查询中隐私偏好问题研究[J]. 软件学报, 2016,27(7): 1805-1821.
|
|
NI W W , CHEN X . User privacy preference support in location privacy-preserving nearest neighbor query[J]. Journal of Software, 2016,27(7): 1805-1821.
|
[23] |
王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4): 693-712.
|
|
WANG L , MENG X F . Location privacy preservation in big data era:a survey[J]. Journal of Software, 2014,25(4): 693-712.
|
[24] |
GOTTESMAN D , CHUANG I L . Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations[J]. Nature, 1999,402(6760): 390-393.
|
[25] |
BARZ S , KASHEFI E , BROADBENT A ,et al. Demonstration of blind quantum computing[J]. Science, 2012,335(6066): 303-308.
|
[26] |
张伊璇, 何泾沙, 赵斌 ,等. 一个基于博弈理论的隐私保护模型[J]. 计算机学报, 2016,39(3): 615-627.
|
|
ZHANG Y X , HE J S , ZHAO B ,et al. A privacy protection model base on game theory[J]. Chinese Journal of Computers, 2016,39(3): 615-627.
|