Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference24 articles.
1. Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557–570.
2. Lin, W. Y., Yang, D. C., & Wang, J. T. (2016). Privacy preserving data anonymization of spontaneous ADE reporting system dataset. BMC Medical Informatics and Decision Making, 16(1), 58.
3. Soria-Comas, J., Domingo-Ferrer, J., Sánchez, D., & Martinez, S. (2015). t-closeness through microaggregation: Strict privacy with enhanced utility preservation. IEEE Transactions on Knowledge and Data Engineering, 27(11), 3098–3110.
4. Mivule, K., Turner, C., & Ji, S. Y. (2012). Towards a differential privacy and utility preserving deep learning classifier. Procedia Computer Science, 12, 176–181.
5. Wong, R. C. W., Fu, A. W. C., Wang, K., & Pei, J. (2007). Minimality attack in privacy preserving data publishing. In Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, (pp. 543–554).
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献