[1] |
DWORK C , . Differential privacy[C]// The 33rd International Colloquium on Automata,Languages and Programming. Berlin:Spinger-Verlag, 2006: 1-12.
|
[2] |
DWORK C . A firm foundation for private data analysis[J]. Communications of the ACM, 2011,54(1): 86-95.
|
[3] |
张啸剑, 孟小峰 . 面向数据发布和分析的差分隐私保护[J]. 计算机学报, 2014,37(4): 927-949. ZHANG X J , MENG X F . Differential privacy in data publication and analysis[J]. Chinese Journal of Computers, 2014,37(4): 927-949.
|
[4] |
DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Theory of Cryptography. Springer Berlin Heidelberg, 2006: 265-284.
|
[5] |
MCSHERRY F , TALWAR K . Mechanism design via differential privacy[C]// Foundations of Computer Science. 2007: 94-103.
|
[6] |
范明, 孟小峰,译 .数据挖掘:概念与技术[M]. 北京: 机械工业出版社, 2012. FAN M MENG X F . Data minify:concepts and techniques[M]. Beijing China Machine Press, 2012.
|
[7] |
BLUM A , DWORK C , MCSHERRY F ,et al. Practical privacy:the SuLQ framework[C]// The 24th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, 2005: 128-138.
|
[8] |
FRIEDMAN A , SCHUSTER A . Data mining with differential privacy[C]// The 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2010: 493-502.
|
[9] |
MOHAMMED N , CHEN R , FUNG B ,et al. Differentially private data release for data mining[C]// The 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2011: 493-501.
|
[10] |
ZHU T , XIONG P , XIANG Y ,et al. An effective deferentially private data releasing algorithm for decision tree[C]// Trust,Security and Privacy in Computing and Communications (TrustCom),2013 12th IEEE International Conference. IEEE, 2013: 388-395.
|
[11] |
PATIL A , SINGH S . Differential private random forest[C]// Advances in Computing,Communications and Informatics International Conference. IEEE, 2014: 2623-2630.
|
[12] |
丁丽萍, 卢国庆 . 面向频繁模式挖掘的差分隐私保护研究综述[J]. 通信学报, 2014,35(10): 200-209. DING L P , LU G Q . Survey of differential privacy in frequent pattern minify[J]. Journal on Communications, 2014,35(10): 200-209.
|
[13] |
卢国庆, 张啸剑, 丁丽萍 ,等. 差分隐私下的一种频繁序列模式挖掘方法[J]. 计算机研究与发展, 2015,52(12): 2789-2801. LU G Q , ZHANG X J , DING L P ,et al. Frequent sequential pattern mining under differential privacy[J]. Journal of Computer Research and Development, 2015,52(12): 2789-2801.
|
[14] |
BREIMAN L . Random forests[J]. Machine Learning, 2001,45(1): 5-32.
|
[15] |
QUINLAN J R , . Induction of decision trees[C]// Readings in Knowledge Acquisition and Learning. San Francisco:Morgan Kaufmann Publishers Inc, 1993: 349-361.
|
[16] |
MCSHERRY F , . Privacy integrated queries:an extensible platform for privacy-preserving data analysis[C]// The 2009 ACM SIGMOD International Conference on Management of Data. ACM, 2009: 19-30.
|