共 15 条
[3]
ROUGH SETS
[J].
INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCES,
1982, 11 (05)
:341-356
[4]
K-anonymity: A model for protecting privacy. Sweeney L. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems . 2002
[5]
l-diversity:Pri-vacy beyondk-anonymity. Machanavajjhala A, Gehrke J, Kifer D, et al. Proceedings of the 22th International Conference on Data Engineering . 2006
[6]
Granular computing. Lin, T.Y. Announcement of the BISC Special Interest Group on Granular Computing . 1997
[7]
Enhanced p-sensitive k-anonymity models. Sun X,Wang H,Li J,Truta T M. TRANSACTIONS on Data Privacy . 2008
[8]
(α,k)-anonymity:An enhanced k-anonymity model for privacy preserving data publicshing. Wong R,Li J,Fu A,Wang K. KDD . 2006
[9]
Button-Up Generalization:A Data Mining Solution to Privacy Protection. K.Wang,P.Yu,S.Chakraborty. Proceedings of the 4thIEEE International Conference on Data Mining(ICDM 2004) . 2004
[10]
t-closeness:Privacy beyond k-anonymity and I-diversity. N Li,T Li. Proceedings of ICDE . 2007