[1]余慧佳, 刘奕群, 张敏, 等. 基于大规模日志分析的搜索引擎用户行为分析[J]. 中文信息学报, 2007, 21(1): 109114[2]Dwork C. A firm foundation for private data analysis[J]. Communications of the ACM, 2011, 54(1): 8695[3]Limam L, Coquil D, Kosch H, et al. Extracting user interests from search query logs: A clustering approach[C] Proc of Database and Expert Systems Applications. Los Alamitos, CA: IEEE Computer Society, 2010: 59[4]McSherry F. Privacy integrated queries: An extensible platform for privacypreserving data analysis[J]. Proceedings of SIGMOD, 2009, 53(9): 1930[5]Fard A M. Privacy preserving Web query log publishing: A survey on anonymization techniques[DBOL]. 2012 [20151125]. http:arxiv.orgabs1211.2354[6]Gotz M, Machanavajjhala A, Wang Guozhang, et al. Publishing search logs—A comparative study of privacy guarantees[J]. IEEE TKDE, 2012, 24(3): 520532[7]Li Xiong, Agichtein E. Towards privacypreserving query log publishing[COL] Proc of WWW07. 2007 [20151115]. http:www2007.orgworkshopspaper_136.pdf[8]李清华, 康海燕, 苑晓姣, 等. 个性化搜索中用户兴趣模型匿名化研究[J]. 西安交通大学学报, 2013, 47(4): 131136[9]Liu Junqiang, Wang Ke. Enforcing vocabulary kanonymity by semantic similarity based clustering[C] Proc of IEEE Int Conf on Data Mining. Piscataway, NJ: IEEE, 2010: 899904[10]HeYeye, Naughton J F. Anonymization of setvalued data via topdown, local generalization[J]. Proceedings of the VLDB Endowment, 2009, 2(1): 934945[11]Hong Yuan, He Xiaoyun, Vaidya J, et al. Effective anonymization of query logs[C] Proc of the 18th ACM Conf on Information and Knowledge Management. New York: ACM, 2009: 14651468[12]Korolova A, Kenthapadi K, Mishra N, et al. Releasing search queries and clicks privately[C] Proc of the 18th Int Conf on World Wide Web. New York: ACM, 2009: 171180[13]HongYuan, Vaidya J, Lu Haibing, et al. Differentially private search log sanitization with optimal output utility[C] Proc of the 15th Int Conf on Extending Database Technology. New York: ACM, 2012: 5061[14]苑晓姣, 康海燕. 一种查询日志匿名化算法[J]. 北京信息科技大学学报, 2013, 28(5): 2427, 31[15]田久乐, 赵蔚. 基于同义词词林的词语相似度计算方法[J]. 吉林大学学报: 信息科学版, 2010, 28(6): 602608[16]Fung B C M, Wang K, Yu P S. Anonymizing classification data for privacy preservation[J]. IEEE TKDE, 2007, 19(5): 711725[17]Wang K, Yu P S, Chakraborty S. Bottomup generalization: A data mining solution to privacy protection[C] Proc of IEEE Int Conf on Data Mining (ICDM). Piscataway, NJ: IEEE, 2004: 249256[18]康海燕, Li Xiong. 面向大数据的个性化检索中用户匿名化方法[J]. 西安电子科技大学学报, 2014, 41(5): 169175
|