2Sweeney L. Kvanonymity , A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5), 557-570.
3Montjoye D, Hidalgo C A, Verleysen M, et al. Unique in the crowd, The privacy bounds of human mobility[J]. Nature, Scientific Reports, 2013, 3(2), 1-5.
4Sweeney L, Abu A, Winn J. Identifying participants in the personal genome project by name[R/OL]. Cambridge, MA, Harvard University Data Privacy Lab.[2013-04-24]. http,// datapri vacyla b. oig] projects/ pgp/ 1 0 21-1. pdf.
5Weitzner D 1, Bruce E J. Big data privacy workshop, Advancing the state of the art in technology and practice[R].[2014-03-03]. http,//web. mit. edu/bigdata-priv/index. html.
6Holdren J P, Lander E S. Big data privacy, A technological perspective[R/OL].[2014-05-01]. http,//www. whi tehouse. gov/ sites/ default/ files/ microsites/ ostp/PCAST / pcast_big_data_and_privacy _-_may _2014. pdf.
8Dong X, Laure B E, Srivastava D. Truth discovery and copying detection in a dynamic world[J]. Proceedings of the VLDB Endowment, 2009, 20), 562-573?.
9Podesta 1, Pritzker r. Moniz E 1, et al. Big data, seizing opportunities preserving values[R/OL]. Washington, Executive Office of the President, The White House Washington.[2014-05-01]. http,//www. whitehouse. gov/ sites/default/files/docs/big _ data _ privacy _ report _ may _ 1_ 2014. pdf.
10Narayanan A, Shmatikov V. Roust de-anonymization of large spare datasets[C]//Proc of the 29th IEEE Syrnp on Security and Privacy (S&.P 2008). New York: IEEE, 2008, 111-125.