[1] |
QU Jingjing, CAI Ying, FAN Yanfang, XIA Hongke.
Differentially Private Mixed Data Release Algorithm Based on k-prototype Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(1): 109-118.
|
[2] |
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao.
Trajectory-Differential Privacy-Protection Method with Interest Region
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(1): 59-72.
|
[3] |
ZHANG Xiaolin, YUAN Haochen, LI Zhuolin, ZHANG Huanxiang, LIU Jiao.
Subgraph Matching Oriented Privacy Preserving Method for Social Network
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1504-1515.
|
[4] |
TONG Danni, SHEN Derong, HAN Shumin, NIE Tiezheng, KOU Yue, YU Ge.
Multi-Party Strong-Privacy-Preserving Record Linkage Method
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 394-407.
|
[5] |
YANG Gaoming, FANG Xianjin+, XIAO Yafei.
Local Differential Privacy Against Link Attack
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(2): 251-262.
|
[6] |
ZHANG Xiaolin, HE Xiaoyu, ZHANG Huanxiang, LI Zhuolin.
PLRD-(k,m):Distributed k-Degree-m-Label Anonymity with Protecting Link Rela-tionships
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(1): 70-82.
|
[7] |
WU Yingjie, CHEN Jinglin, CAI Jianping, WANG Yilei.
Error Analysis of Differential Privacy Data Publishing Method with Matrix Mechanism
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(7): 1075-1086.
|
[8] |
ZHANG Shuangyue, CAI Jianping, TIAN Feng, WU Zhenqiang.
Trajectory Flow Releasing Method with Consistency Constraint under Differential Privacy
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(12): 1903-1913.
|
[9] |
GE Chen, WU Yingjie, SUN Lan.
Real-Time Publishing Method of Differential Privacy Streaming Data
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(11): 1748-1757.
|
[10] |
DAI Hua, WANG Min, YI Xun, YANG Geng, YE Qingqun.
Survey of Secure MAX/MIN Query Processing in Wireless Sensor Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(8): 1191-1203.
|
[11] |
JIN Kaizhong, ZHANG Xiaojian, PENG Huili.
KD-TSS: Accurate Method for Private Spatial Decomposition
[J]. Journal of Frontiers of Computer Science and Technology, 2017, 11(10): 1579-1590.
|
[12] |
CAI Jianping, WU Yingjie, WANG Xiaodong.
Method Based on Matrix Mechanism for Differential Privacy Continual Data Release
[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(4): 481-494.
|
[13] |
LI Ning, ZHU Qing.
Privacy Preserving Based on Model Division for Large Data
[J]. Journal of Frontiers of Computer Science and Technology, 2012, 6(11): 961-973.
|
[14] |
ZHANG Yizhen+; JIN Cheqing;HU Haoji;ZHOU Aoying .
BFSQ: Handling Spatial Membership Query*
[J]. Journal of Frontiers of Computer Science and Technology, 2010, 4(8): 692-699.
|