[1] 林培光, 康海燕. 面向Web的个性化语义信息检索技术[M]. 北京: 中国财政经济出版社, 2009.
[2] Fung B C M, Wang K, Chen R, et al. Privacy-preserving Data Publishing: a Survey on Recent Developments[J]. ACM Computing Surveys (CSUR), 2010, 42(4): 14.
[3] Liu Junqiang. Privacy Preserving Data Publishing: Current Status and New Directions[J]. Information Technology Journal, 2012, 11(1): 1-8.
[4] Kiran P, Kavya N P. A Survey on Methods, Attacks and Metric for Privacy Preserving Data Publishing[J]. International Journal of Computer Applications, 2012, 53(18): 20-28.
[5] Sweeney L. k-anonymity: a Model for Protecting Privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
[6] Wang Qian, Xu Zhiwei, Qu Shengzhi. An Enhanced K-Anonymity Model against Homogeneity Attack[J]. Journal of Software, 2011, 6(10): 1945-1952.
[7] Machanavajjhala A, Gehrke J, Kifer D, et al. l-diversity: Privacy beyond k-anonymity[C]//Proceedings of the 22nd International Conference on Data Engineering. Piscataway: IEEE, 2006: 24-35.
[8] Li N, Li T. t-closeness: Privacy beyond k-anonymity and l-diversity[C]//Proceedings of the 23rd International Conference on Data Engineering. Piscataway: IEEE, 2007: 106-115.
[9] 李清华, 康海燕, 苑晓姣, 等. 个性化搜索中用户兴趣模型匿名化研究[J]. 西安交通大学学报, 2013, 47(4): 143-148.
Li Qinghua, Kang Haiyan, Yuan Xiaojiao, et al. Study on User Profile Anonymization in Personalized Web Search[J]. Journal of Xi'an Jiaotong University, 2013, 47(4): 143-148.
[10] Zhu Y, Xiong L, Verdery C. Anonymization of User Profiles for Personalized Web Search[C]//Proceedings of 19th International Conference on World Wide Web. New York: ACM, 2010: 1125-1126.
[11] Dwork C. A Firm Foundation for Private Data Analysis[J]. Communications of the ACM, 2011, 54(1): 86-95.
[12] Hall R, Rinaldo A, Wasserman L. Differential Privacy for Functions and Functional Data[J]. Journal of Machine Learning Research, 2013, 14(1): 703-727.
[13] Mohammed N, Chen R, Fung B C M, et al. Differentially Privacy Data Release for Data Mining[C]//Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2011: 493-501.
[14] Xiao X, Wang G, Gehrke J. Differential Privacy via Wavelet Transforms[C]//26th IEEE International Conference on Data Engineering. Piscataway: IEEE, 2010: 225-236.
[15] McSherry F, Talwar K. Mechanism Design via Differential Privacy[C]//IEEE Symposium on FOCS. Los Alamitos: IEEE, 2007: 94-103. |