[1] Dwork C.Differential privacy[A].Proceedings of the 33rd Int Colloquium on Automata,Languages and Programming[C].Berlin:Springer,2006.1-12.
[2] Dwork C.Lei J.Differential privacy and robust statistics[A]. Proceedings of the 41th Annual ACM Symp on Theory of Computing[C].New York:ACM,2009.371-380.
[3] Dwork C,McSherry F,Nissim K,Smith A.Calibrating noise to sensitivity in private data analysis[A].Proceedings of the 3th Theory of Cryptography Conference[C].Berlin:Springer,2006.363-385.
[4] Chen R,Fung B,Desai B C.Differentially private trajectory data publication[J].arXiv,2011,1(9):1112-2020
[5] Chen R,Mohammed N,Fung B C M,et al.Publishingset-valued data via differential privacy[A].Proceedings of the 37th Conference of Very Large Databases[C].New York:ACM,2011.1087-1098.
[6] Bonomi L,Xiong L.A two-phase algorithm for mining sequentialpatterns with differential privacy[A].Proceedings of the 22nd ACM International Conference on Information and Knowledge Management[C].New York:ACM,2013.269-278.
[7] Mohammed J Zaki.SPADE:An Efficient Algorithm for Mining Frequent Sequences[J].Machine Learning,2001,1(42):31-60.
[8] Chen R,Fung B,Desai B.C,et al.Differentially private transit data publication:a case study on the montreal transportation system[A]. Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].New York:ACM,2012.213-221.
[9] Chen R,Gergely A,Claude C.Differentially private sequential data publication via variable-length n-grams[A].Proceedings of the 19th ACM Conf on Computer and Communications Security[C].New York:ACM,2012.638-649.
[10] Cheng X,S Su,S Xu,et al.Dp-apriori:A differentially private frequent itemset mining algorithm based on transaction splitting[J].Computers & Security,2015,50(1):74-90.
[11] Su S,Cheng X,et al.Differentially private frequent sequence mining via sampling-based candidate pruning[A].Proceedings of the 31st IEEE International Conference on Data Engineering[C].Washington,DC:IEEE Computer Society,2015.1035-1046.
[12] Hua Jingyu,Gao Yue,Zhong Sheng.Differentially private publication of general time-serial trajectory data[A].Proc of INFCOM[C].Piscataway,NJ:IEEE,2015.163-175.
[13] R Agrawal,R Srikant.Fast algorithms for mining association rules in large databases[J].Proceedings of the VLDB Endowment,1994,23(3):487-499.
[14] Zeng C,J F Naughton,J Y Cai.On differentially private frequent itemset mining[J].Proceedings of the VLDB Endowment,2012,6(1):25-36.
[15] 李杨,郝志峰,温雯,等.差分隐私保护k-means聚类方法研究[J].计算机科学,2013,40(3):287-290. Li Y,Hao Z,Wen W,et al.Research on differential privacy preserving k-means clustering[J].Computer Science,2013,40(3):287-290.(in Chinese)
[16] 张啸剑,王淼,孟小峰.差分隐私保护下一种精确挖掘top-k频繁模式方法[J].计算机研究与发展,2014,51(1):104-114. Zhang X,Wang M,Meng X.An accurate method for mining top-k frequent pattern under differential privacy[J].Journal of Computer Research and Development,2014,51(1):104-114.(in Chinese)
[17] 张啸剑,孟小峰.面向数据发布和分析的差分隐私保护研究综述[J].计算机学报,2014,37(4):927-949. Zhang X,Meng X.Differential privacy in data publication and analysis[J].Chinese Journal of Computers,2014,37(4):927-949.(in Chinese)
[18] McSherry F.Privacy integrated queries:an extensible platform for privacy-preserving data analysis[A].Proceedings of the 35th ACM SIGMOD Int Conf on Management of Data[C].New York:ACM,2009.19-30.
[19] Xiang Cheng,Sen Su,Shengzhi Xu,Li Xiong,et al.A two-phase algorithm for differentially private frequent subgraph mining[J].IEEE Transactions on Knowledge and Data Engineering,2018,30(8):1411-1425.
[20] Chen R,Noman M.,B.C.M.Fung,et al.Publishing set-valued data via sifferential Privacy[J].PVLDB,2011,4(11):1087-1098. |