Publisher
Engineering and Technology Publishing
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Information Systems,Software
Reference17 articles.
1. [1] E. Simperl, K. O'Hara, R. Gomer, "Open data and privacy," Report, University of Southampton, Electronics and Computer Science, Southampton: European Data Portal, 2016.
2. [2] L. Sweeney, "K-anonymity: A model for protecting privacy," IEEE Security and Privacy, vol. 10, pp. 1-14, 2002.
3. [3] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubra-maniam, "l-diversity: Privacy beyond k-anonymity," ACM Transactions on Knowledge Discovery from Data-TKDD, vol. 1, p. 24, 2006.
4. [4] N. Li, T. Li, and S. Venkatasubramanian, "T-closeness: Privacy beyond k-anonymity and l-diversity," in Proc. IEEE 23rd International Conference on Data Engineering (ICDE), 2007, vol. 2, pp. 106-115.
5. [5] K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Incognito: Efficient full-domain k-anonymity," in Proc. the ACM SIGMOD International Conference on Management of Data, 2005, pp. 49-60.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An anonymous user discovery algorithm based on the Naive Bayes algorithm;2023 IEEE 3rd International Conference on Computer Systems (ICCS);2023-09-22