1. DWORKC,ROTHA.The algorithmic foundations of difrential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2013, 9(3/4): 211-407.
2. DEWRIR, THURIMELLAR. Exploiting service similarity for privacy in location-based search queries[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25 (2): 374-383.
3. MEDKOVÁJ. Composition attack against social network data[J]. Computers & Security, 2018, 74: 115-129.
4. Peng, H. L., Jin, K. Z., Fu, C. C., et al. A sequence lattice-based approach to privacy temporal pattern mining[J]. Journal of Electronics, 2020, 48(1): 153-163. PENG H L, JIN KZ, FU C C, et al. Private time series pattern mining with sequential lattice[J]. Acta Electronica Sinica, 2020, 48(1): 153-163. (in Chinese)
5. Chen S, Fu A-M, Ke H-F, et al. MCDP: A neural network-based approach to multicluster distributed differential privacy data distribution[J]. Journal of Electronics, Acta Electronica Sinica, 2020, 48(12): 2297-2303. (in Chinese)