Author:
Geng Liqiang,You Yonghua,Wang Yunli,Liu Hongyu
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Lecture Notes in Computer Science;L. Korba,2008
2. Sokolova, M., Emam, K.: Evaluation of Learning from Screened Positive Examples. In: Proceedings of the 3rd Workshop on Evaluation Methods for Machine Learning, in Conjunction with the 25th International Conference on Machine Learning (ICML 2008), Helsinki, Finland (2008)
3. Sweeney, L.: K-Anonymity: a Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness, and Knowledge-Based Systems 10(5), 557–570 (2002)
4. Machanavajjhala, A., Gehrke, J., Kifer, D.: l-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), Atalanta, USA, p. 24 (2006)
5. Li, N., Li, T., Venkatasubramanian, S.: Privacy Beyond k-Anonymity and l-Diversity. In: Proceedings of the 23rd International Conference on Data Engineering (ICDE 2007), Istanbul, Turkey, pp. 106–115 (2007)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献