1)k-anonymizationk-匿名化
1.Previous researches about k-anonymity have concentrated on k-anonymization algorithm for single view,but these a.首先,分析了视图分别进行概括、保持数据一致性、最小概括情况下,如何使视图组满足k-匿名约束;然后,根据上述各种情况,分别给出了独立概括法、联合概括法和属性概括法等视图组k-匿名化算法。
2)k-anonymityk-匿名
1.Analysis and improvement of k-anonymity based on personalized anonymity;基于个人化匿名的k-匿名方法的分析与改进
2.Algorithm for Finding Quasi-identifiers in the k-anonymity Method;k-匿名方法中准标识符的求解算法
3.Survey of K-anonymity research on privacy preservation;隐私保护中K-匿名模型的综述
英文短句/例句
1.Attacking algorithm against k-anonymized continuous queries in location based service一种针对LBS中k-匿名连续查询的攻击算法
2.Analysis and Improvement for k-anonymity Model in Medical Information Data Publishing医疗信息发布中k-匿名模型的分析与改进
3.k-APPRP:a Partitioning Based Privacy Preserving k-anonymous Algorithm for Re-publication of Incremental Datasetsk-APPRP:一种基于划分的增量数据重发布隐私保护k-匿名算法
4.Algorithms to Find the Set of Relevant Views and Quasi-Identifiers for K-Anonymity Methodk-匿名方法中相关视图集和准标识符的求解算法
5.(p,a)-sensitive k-anonymity:privacy protection model(p,a)-sensitivek-匿名隐私保护模型
6.Study and Improvement on K-Anonymity Model for Private Protection保护隐私的K-匿名模型研究和改进
7.Algorithms for incremental update of K-anonymity table based on multi-dimension bucket基于多维桶的K-匿名表增量更新算法
8.Checking and Preventing Privacy Inference Attacks Based on K-Anonymized Microdata;基于K匿名数据集的隐私推理攻击检测和防范研究
9.Anonymous FTP: Yes支持匿名FTP上传
10.poison-pen letterph.1. 匿名诽谤信
11.anonymous and pseudonymous literature匿名和使用笔名的文学
12.The condition of having a disguised or concealed identity.隐姓埋名,匿名隐匿姓名身份或隐姓埋名的情况
13.anonymous corruption inquiry有关贪污的匿名查询
14.We received an anonymous letter.我们收到一封匿名信。
15.Don't bother yourself with these anonymous letters.别为这些匿名信而烦恼。
16.anonymous remailerph.1. 【电脑】匿名转信站
17.The author of the book shall be nameless.该书的作者是匿名的。
18.anonymous non-corruption report非贪污性质的匿名举报
相关短句/例句
k-anonymityk-匿名
1.Analysis and improvement of k-anonymity based on personalized anonymity;基于个人化匿名的k-匿名方法的分析与改进
2.Algorithm for Finding Quasi-identifiers in the k-anonymity Method;k-匿名方法中准标识符的求解算法
3.Survey of K-anonymity research on privacy preservation;隐私保护中K-匿名模型的综述
3)(L,K)-anonymity(L,K)-匿名
4)k-anonymizationk-匿名
1.Recently,microaggregation algorithm is proposed as an alternative to generalization/suppression method for k-anonymization whose goal is to cluster a set of records into groups of size at least k such that groups are as homogeneous as possible.数据表的k-匿名化(k-anonymization)是数据发布时保护私有信息的一种重要方法。
2.K-anonymization is an important approach to protect data privacy in data publishing scenario.K-匿名是微数据发布隐私保护的一种重要方法。
3.An attacking algorithm aimed at the k-anonymization algorithm was presented based on the model.针对k-匿名机制无法保证位置信息服务(LBS)中连续查询隐私性的问题,提出一种连续查询发送模型,该模型融合了查询发送时间的间隔模型和连续性模型。
5)k-anonymity modelK-匿名模型
1.A K-anonymity model for protecting privacy;一种用来保护私有信息的K-匿名模型
6)anonymization匿名化
1.Research on Utility-Based Anonymization;基于可用性的数据匿名化研究
2.Recently,the anonymization technique has become the highlight of privacy preserving research community.匿名化技术由于能在保护隐私信息的同时,保证对外发布数据的真实性,适用于众多领域的应用,成为近年来隐私保护技术研究领域的热点。
3.This paper introduces the main anonymity preservation models,reviews the research advances and analyzes the limitations of the anonymization algorithms that generalization and suppression-based,clustering-based and swapping-based.介绍主要的数据匿名保护模型,总结分析基于泛化和隐匿、基于聚类、基于交换和分解的数据匿名化算法的研究成果和存在的问题,指出数据发布的匿名化技术还需要在同质性攻击和背景知识攻击、动态性数据的隐私保护、个性化的隐私保护、数据发布自适应机制、面向应用的隐私保护和多属性数据集的隐私保护等几个方面做进一步的研究。
延伸阅读
公理化方法(见公理化和形式化)公理化方法(见公理化和形式化)axiomatical method gongllbuafangfa公理化方法化和形式化。(axiomatieal method)见公理