资源描述:
《面向频繁模式挖掘的差分隐私保护研究综述.pdf》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、3510Vol.35No.10201410JournalonCommunicationsOctober2014doi:10.3969/j.issn.1000-436x.2014.10.02311,2(1.1001902.100190)!"#$%&'()"#*+,-./012345"#678%9:;<5()"#67=>?@ABCDEF5()"#G3HI=JKLMNOPQRPSTU
2、V)WALXTYZNOJ[PS5Q%()"#A"#67AATP309.2;TP392A1000-436X(2014)10-0200-10Surveyofdifferentialprivacyinfrequentpatternmining11,2DINGLi-ping,LUGuo-qing(1.NationalEngineeringResearchCenterofFundamentalSoftware,InstituteofSoftware,ChineseAcademyofSciences,Beijing100190,China;2.Univer
3、sityofChineseAcademyofSciences,Beijing100190,China)Abstract:Frequentpatternminingisanexploratoryprobleminthefieldofdatamining.However,directlyreleasingthediscoveredfrequentpatternsandthecorrespondingtruesupportsmayrevealtheindividuals’privacy.Thestate-of-the-artsolutionforthisproblemisdifferent
4、ialprivacy,whichoffersastrongdegreeofprivacyprotectionbyaddingnoise.Firstly,thetheoreticalbasisofdifferentialprivacywasintroduced.Then,threerepresentativefrequentpatternminingmethodsunderdifferentialprivacyweresummarizedandcomparedindetail.Finally,somefutureresearchdirectionswerediscussed.Keywo
5、rds:differentialprivacy;privacyprotection;frequentpattern;datamining/2)sTUc1rshipq5[1](FPM,frequentpatternmining)zyOb¡z¢£¤¥8¦§5(!"#¨+hi(DP,differentialprivacy)Dwork$)%&'()%*+,+-.-/02006©T3tªlhipq[2]123456789:;</z5«rsd¬®oEhipqz2
6、8[3]=>?@ABCDE*FGH1)¯°¤)±z:%²/IJKLMN+,OPQRSTUVW5XYj³cQ´µ¶j·¸¹º»Z[]@^_`abc?defS¼½¾¿Àc½¾`a(µÁ8)ghi`a"jkfSglm[n5«½¾hiÂsÃkf2)hipqÄoEhipqrs8Q3tk-uv^wx¤Å¯°/9FÆÇrs5mȨ+hi[4]+yz{
7、z}~=21)ÉÊ@Ë2rÌÍ1)_hipqÎsÏ2014-03-03A2014-04-20]^_`abcdefgd8(2012ZX01039-004)
8、Ah]_ijkV_`:lcdefgd8(XDA06010600)FoundationItems:TheNationalScienceandTechnologyMajorProgramofChina(2012ZX01039-004);TheStrategicTechnologyPilotProgramoftheChineseAcademyofSciences(XDA06010600)10201[13][14]