期刊文献+
共找到61篇文章
< 1 2 4 >
每页显示 20 50 100
Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility 被引量:1
1
作者 Rupali Gangarde Amit Sharma Ambika Pawar 《Computers, Materials & Continua》 SCIE EI 2023年第4期2171-2190,共20页
Online Social Networks (OSN) sites allow end-users to share agreat deal of information, which may also contain sensitive information,that may be subject to commercial or non-commercial privacy attacks. Asa result, gua... Online Social Networks (OSN) sites allow end-users to share agreat deal of information, which may also contain sensitive information,that may be subject to commercial or non-commercial privacy attacks. Asa result, guaranteeing various levels of privacy is critical while publishingdata by OSNs. The clustering-based solutions proved an effective mechanismto achieve the privacy notions in OSNs. But fixed clustering limits theperformance and scalability. Data utility degrades with increased privacy,so balancing the privacy utility trade-off is an open research issue. Theresearch has proposed a novel privacy preservation model using the enhancedclustering mechanism to overcome this issue. The proposed model includesphases like pre-processing, enhanced clustering, and ensuring privacy preservation.The enhanced clustering algorithm is the second phase where authorsmodified the existing fixed k-means clustering using the threshold approach.The threshold value is determined based on the supplied OSN data of edges,nodes, and user attributes. Clusters are k-anonymized with multiple graphproperties by a novel one-pass algorithm. After achieving the k-anonymityof clusters, optimization was performed to achieve all privacy models, suchas k-anonymity, t-closeness, and l-diversity. The proposed privacy frameworkachieves privacy of all three network components, i.e., link, node, and userattributes, with improved utility. The authors compare the proposed techniqueto underlying methods using OSN Yelp and Facebook datasets. The proposedapproach outperformed the underlying state of art methods for Degree ofAnonymization, computational efficiency, and information loss. 展开更多
关键词 Enhanced clustering online social network k-anonymITY t-closeness l-diversity privacy preservation
下载PDF
Understanding the Importance of Effective Third-Party Risk Management on Data Governance
2
作者 Marios E.Menexiadis Michail Ch.Xanthopoulos 《Management Studies》 2023年第6期307-311,共5页
With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaboratio... With a view to adopting to the globalized business landscape,organizations rely on third-party business relationships to enhance their operations,expand their capabilities,and drive innovation.While these collaborations offer numerous benefits,they also introduce a range of risks that organizations must carefully mitigate.If the obligation to meet the regulatory requirements is added to the equation,mitigating the third-party risk related to data governance,becomes one of the biggest challenges. 展开更多
关键词 third-party risk data governance data breach internal control system risk mitigation
下载PDF
Strategies for China’s Response to and Improvement of Third-Party Funding in International Investment Arbitration
3
作者 Na Yao Lijuan Liu Lili Cheng 《Proceedings of Business and Economic Studies》 2023年第6期134-138,共5页
China should prioritize the establishment and enhancement of a third-party funding system.It should actively refine the existing arbitration rules,addressing any loopholes in the current regulatory framework.Comprehen... China should prioritize the establishment and enhancement of a third-party funding system.It should actively refine the existing arbitration rules,addressing any loopholes in the current regulatory framework.Comprehensive measures should be implemented to regulate third-party funding,aligning with international trends.This is crucial not only to safeguard the foreign investment of the Chinese government and enterprises but also to position China as a globally influential arbitration center. 展开更多
关键词 third-party funding International investment ARBITRATION
下载PDF
基于事务型K-Anonymity的动态集值属性数据重发布隐私保护方法 被引量:7
4
作者 武毅 王丹 蒋宗礼 《计算机研究与发展》 EI CSCD 北大核心 2013年第S1期248-256,共9页
研究了动态集值属性数据重发布中的隐私保护问题.真实的数据随时间的推移因插入、删除、修改等操作而产生动态变化.更新后数据的重发布将面临攻击者使用历史发布结果对敏感信息揭露的风险.提出了一种面向动态集值属性数据重发布的隐私... 研究了动态集值属性数据重发布中的隐私保护问题.真实的数据随时间的推移因插入、删除、修改等操作而产生动态变化.更新后数据的重发布将面临攻击者使用历史发布结果对敏感信息揭露的风险.提出了一种面向动态集值属性数据重发布的隐私保护模型,延续使用事务型k-anonymity原则保护记录间的不可区分性,并通过维持记录中敏感元素在更新过程中的多样性和连续性阻止其被揭露.结合局部重编码泛化和隐匿技术降低数据匿名产生的信息损失,进而提出了完整的重发布算法.通过在真实数据集上进行的实验和比较,研究结果表明提出的方法能有效阻止敏感信息的泄露,并降低发布结果的信息损失. 展开更多
关键词 隐私保护 事务型k-anonymity 集值属性数据 动态数据集 重发布
下载PDF
A Trajectory Privacy Protection Method to Resist Long-Term Observation Attacks
5
作者 Qixin Zhan 《Journal of Computer and Communications》 2024年第5期53-70,共18页
Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exp... Users face the threat of trajectory privacy leakage when using location-based service applications, especially when their behavior is collected and stored for a long period of time. This accumulated information is exploited by opponents, greatly increasing the risk of trajectory privacy leakage. This attack method is called a long-term observation attack. On the premise of ensuring lower time overhead and higher cache contribution rate, the existing methods cannot utilize cache to answer subsequent queries while also resisting long-term observation attacks. So this article proposes a trajectory privacy protection method to resist long-term observation attacks. This method combines caching technology and improves the existing differential privacy mechanism, while incorporating randomization factors that are difficult for attackers to recognize after long-term observation to enhance privacy. Search for locations in the cache of both the mobile client and edge server that can replace the user’s actual location. If there are replacement users in the cache, the query results can be obtained more quickly. Simultaneously obfuscating the spatiotemporal correlation of actual trajectories by generating confusion regions. If it does not exist, the obfuscated location generation method that resists long-term observation attacks is executed to generate the real anonymous area and send it to the service provider. The above steps can comprehensively protect the user’s trajectory privacy. The experimental results show that this method can protect user trajectories from long-term observation attacks while ensuring low time overhead and a high cache contribution rate. 展开更多
关键词 Location Privacy Long-Term Observation Attacks k-anonymITY Location Caching
下载PDF
一种基于K-anonymity模型的数据隐私保护算法 被引量:5
6
作者 谷汪峰 饶若楠 《计算机应用与软件》 CSCD 北大核心 2008年第8期65-67,共3页
在数据共享的同时,如何保证数据的隐私性是一个重要的问题。泛化方法是数据隐私保护的一种重要方法,但现有的泛化算法不能处理连续属性,数据错误率比较高。在K-anonymity模型基础上,提出了一种扩展泛化算法EGA(Extended Generalization ... 在数据共享的同时,如何保证数据的隐私性是一个重要的问题。泛化方法是数据隐私保护的一种重要方法,但现有的泛化算法不能处理连续属性,数据错误率比较高。在K-anonymity模型基础上,提出了一种扩展泛化算法EGA(Extended Generalization Algorithm),该算法在满足给定K值的条件下,用相对不具体的值最小限度地替换敏感数据,并实现了对离散属性和连续属性的处理。实验结果表明,与现有泛化算法相比,提出的算法具有运行效率高、数据错误率低、能保持敏感数据分类特性等优点。 展开更多
关键词 k-anonymITY 数据隐私 数据泛化
下载PDF
The third-party regulation on food safety in China:A review 被引量:11
7
作者 ZHANG Man QIAO Hui +3 位作者 WANG Xu PU Ming-zhe YU Zhi-jun ZHENG Feng-tian 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2015年第11期2176-2188,共13页
Stakeholders in the field of food safety management in China can be classified into three categories, government, food producers (farmers and enterprises), and the third-party regulatory bodies. The third-party regu... Stakeholders in the field of food safety management in China can be classified into three categories, government, food producers (farmers and enterprises), and the third-party regulatory bodies. The third-party regulation has experienced rapid development in past twenty years, and recently received considerable attention from consumers and the central government. This paper provides a review about the development, problems and future trend of the third-party regulation on food safety in China. To be specific, five forms of the third-party regulation are assessed, including media exposure, the third-party certification, regulation by consumer associations, social movements promoted by non-governmental organiza- tions (NGOs), and regulation by industry associations. The study concludes that media and consumer associations are the major players in the third-party regulation and are highly repudiated among customers. The food certification industry has developed rapidly, but is now facing crises of confidence among consumers because of its lack of self-regulation. NGOs and industry associations still remain in the early development stages of food safety management, and therefore, are of little importance in current regulatory bodies. 展开更多
关键词 food safety China the third-party regulation MEDIA CERTIFICATION
下载PDF
The Status Quo of Chinese Agro-products Logistics and the Establishment of the Third-Party Logistics Mode 被引量:3
8
作者 CHEN Jing School of Economic and Business Administration,Yantai University,Yantai 264005,China 《Asian Agricultural Research》 2011年第5期100-102,106,共4页
The status quo of Chinese agro-products logistics is analyzed from the following five aspects:the circulation mode,exchange mode,storage and transportation situation,food security.The following problems in Chinese agr... The status quo of Chinese agro-products logistics is analyzed from the following five aspects:the circulation mode,exchange mode,storage and transportation situation,food security.The following problems in Chinese agro-products logistics are pointed out,including excessive circulation sections,bad time efficiency,single payment,slow circulation,backward information processing,obvious bullwhip effect,low logistics efficiency,low logistics technology,inadequate professional equipments,low standardization degree,organized operation mode and low degree of scale.The third-party logistics mode of agro-products is analyzed and the advantages of the mode are analyzed as well.Firstly,establishing information network through integrating circulation section to accelerate the circulation of agro-products;secondly,making the operation norms by providing professional equipments to secure the quality of agricultural products;thirdly,improving the core competitiveness of the whole logistics chain by intensifying specialized work division in each section of the supply chain;fourthly,through forming scale economy to reduce logistics costs and increase the diversity of products;fifthly,through signing contracts to clarify duties and responsibilities and materialize the profit integration of the supply chain.The measures for establishing the third-party logistics of agro-products are put forward,including establish the awareness and concept of socialized logistics services;intensify the support on the third-party logistics enterprises of agro-products;lay stress on the cultivation of logistics talents of agro-products;and vigorously apply the modern marketing means. 展开更多
关键词 Agro-products CIRCULATION PATTERN The third-party
下载PDF
China-Japan Cooperation in Third-Party Markets: Japan's Strategic Thinking and Its Obstacles 被引量:2
9
作者 Wang Jingchao 《China International Studies》 2019年第4期64-81,共18页
Positive signs have been shown in Japan's attitude toward China's Belt and Road Initiative (BRI) since 2017. The two countries have reached significant consensus on third-party market cooperation along the Bel... Positive signs have been shown in Japan's attitude toward China's Belt and Road Initiative (BRI) since 2017. The two countries have reached significant consensus on third-party market cooperation along the Belt and Road routes. Third-party market cooperation is not only expected to become an innovative platform for Sino-Japanese economic exchanges in the new era, but it is also a valuable asset for durable and sustained future of bilateral relations. Therefore, an in-depth analysis is necessary on Japan's policy considerations and the realistic obstacles it faces when cooperating in third-party markets, in order to address challenges and advance China-Japan partnership. 展开更多
关键词 China-Japan COOPERATION third-party MARKETS Japan's STRATEGIC THINKING
下载PDF
Analysis of Problems and Policy Recommendations for the Third-party Evaluation in the Present Poverty Alleviation 被引量:1
10
作者 Bosheng ZHANG Zisheng YANG +4 位作者 Wen ZHONG Feng QIU Chenhao LU Yi LOU Meiqi SHAO 《Asian Agricultural Research》 2019年第9期65-69,共5页
The introduction of third-party evaluation system and the implementation of third-party evaluation system in poverty alleviation is a major innovation in the targeted poverty alleviation work in China.In order to impr... The introduction of third-party evaluation system and the implementation of third-party evaluation system in poverty alleviation is a major innovation in the targeted poverty alleviation work in China.In order to improve the third-party evaluation mechanism,further improve the efficiency of third-party evaluation,and enhance the effectiveness of targeted poverty alleviation,this paper analyzes and summarizes the main problems existing in the current third-party evaluation practice.In view of the related problems,this paper puts forward the corresponding policy recommendations,which are believed to play a positive role in further promoting the development and improvement of the third-party evaluation of getting rid of poverty. 展开更多
关键词 POVERTY alleviation third-party evaluation Existing PROBLEMS POLICY RECOMMENDATIONS
下载PDF
Operational risk assessment of third-party payment platforms:a case study of China 被引量:1
11
作者 Yinhong Yao Jianping Li 《Financial Innovation》 2022年第1期604-623,共20页
Operational risk events have severely impacted the development of third-party payment(TPP)platforms,and have even led to a discussion on the operational risk capital charge settlement by relevant international regulat... Operational risk events have severely impacted the development of third-party payment(TPP)platforms,and have even led to a discussion on the operational risk capital charge settlement by relevant international regulators.However,prior studies have mostly focused on qualitative mechanism analysis,and have rarely examined quantitative risk assessment based on actual operational risk events.Therefore,this study attempts to assess the operational risk on TPP platforms in China by constructing a systematic framework incorporating database construction and risk modeling.First,the operational risk database that covers 202 events between Q1,2014,and Q2,2020 is constructed.Then,specific causes are clarified,and the characteristics are analyzed from both the trend and loss severity perspectives.Finally,the piecewise-defined severity distribution based-Loss Distribution Approach(PSD-LDA)with double truncation is utilized to assess the operational risk.Two main conclusions are drawn from the empirical analysis.First,legal risk and external fraud risk are the two main causes of operational risk.Second,the yearly Value at Risk and Expected Shortfall are 724.46 million yuan and 1081.98 million yuan under the 99.9%significance level,respectively.Our results are beneficial for both TPP platform operators and regulators in managing and controlling operational risk. 展开更多
关键词 third-party payment(TPP) Operational risk Loss distribution approach(LDA) Value at risk(VaR) Expected shortfall(ES)
下载PDF
Reciprocal Cloaking Algorithm for Spatial K-Anonymity
12
作者 侯士江 刘国华 《Journal of Donghua University(English Edition)》 EI CAS 2013年第1期49-53,共5页
Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. Due to the nature of spatial queries, location-based service (LBS) needs the user position in or... Mobile devices with global positioning capabilities allow users to retrieve points of interest (POI) in their proximity. Due to the nature of spatial queries, location-based service (LBS) needs the user position in order to process requests. On the other hand, revealing exact user locations to LBS may pinpoint their identities and breach their privacy. Spatial K-anonymity (SKA) exploits the concept of K-anonymity in order to protect the identity of users from location-based attacks. However, existing reciprocal methods rely on a specialized data structure. In contrast, a reciprocal algorithm was proposed using existing spatial index on the user locations. At the same time, an adjusted median splits algorithm was provided. Finally, according to effectiveness (i.e., anonymizing spatial region size) and efficiency (i.e., construction cost), the experimental results verify that the proposed methods have better performance. Moreover, since using employ general-purpose spatial indices, the proposed method supports conventional spatial queries as well. 展开更多
关键词 location-based services k-anonymITY PRIVACY spatial databases
下载PDF
Exploring Third-party Markets through BRI
13
作者 WU HAO 《China Today》 2019年第1期42-43,共2页
IN June 2015,China and France released a joint statement to explore third-party markets.The statement,for the first time,put forward the concept of“cooperation in third-party markets,”and defined the key areas to be... IN June 2015,China and France released a joint statement to explore third-party markets.The statement,for the first time,put forward the concept of“cooperation in third-party markets,”and defined the key areas to be tapped into as well as the basic principles to be followed. 展开更多
关键词 China and FRANCE third-party MARKETS
下载PDF
Hybrid Intelligent Approach for the Selection of Third-Party Reverse Logistics Provider under Uncertainty
14
作者 宫艳雪 宋俊典 +2 位作者 彭亦功 添玉 郑树泉 《Journal of Donghua University(English Edition)》 EI CAS 2014年第4期484-492,共9页
A hybrid intelligent approach is proposed to help the decision maker to select the appropriate third-party reverse logistics provider. The following process is included: firstly,the evaluation team is established to d... A hybrid intelligent approach is proposed to help the decision maker to select the appropriate third-party reverse logistics provider. The following process is included: firstly,the evaluation team is established to determine the selection criteria and evaluate them by triangular fuzzy numbers; secondly,calculate the weight of criteria by the proposed hybrid algorithm integrating particle swarm optimization( PSO) and simulated annealing( SA); then, the performance evaluation for each supplier is predicted by the proposed self-feedback neural network( SFBNN) based on the historical data. A numerical example is also presented to interpret the methodology above. 展开更多
关键词 hybrid intelligent approach third-party reverse logistics provider UNCERTAINTY
下载PDF
Work Effectiveness,Problems and Countermeasures of Third-Party Assessment Teams from Colleges and Universities for Targeted Poverty Alleviation
15
作者 Jia WANG Zisheng YANG +1 位作者 Zhiqing YAN Shiqin YANG 《Asian Agricultural Research》 2020年第1期37-43,共7页
Conducting a third-party assessment on targeted poverty alleviation can effectively avoid the disadvantage that local government plays as both athlete(i.e.performer of poverty alleviation work)and referee(i.e.referee ... Conducting a third-party assessment on targeted poverty alleviation can effectively avoid the disadvantage that local government plays as both athlete(i.e.performer of poverty alleviation work)and referee(i.e.referee for poverty alleviation effect)in poverty alleviation to ensure the truth of poverty alleviation,and therefore,it is an important part of the work to win the battle against poverty.Since 2016,the thirdparty assessment teams from colleges and universities for targeted poverty alleviation have achieved good results and performance in the assessment on both the effectiveness of targeted poverty alleviation work and the exit of poor counties in China,and they have made due contributions to the cause of poverty alleviation.However,as a new thing,third-party assessment obviously has some problems,mainly including the following:subjective understanding on the long-term nature of rural poverty alleviation is insufficient,and there is a lack of long-term considerations and related mechanism for third-party assessment;affected by policies and institutions,most of the existing third-party assessment teams from colleges and universities have not regarded third-party assessment of targeted poverty alleviation as a cause,and they lack the motivation to actively study the assessment business;and the third-party assessment staff from colleges and universities for targeted poverty alleviation have low stability and high mobility,not conducive to the long-term construction of assessment teams.In order to establish long-term poverty alleviation and prevention mechanisms,these issues must be addressed squarely and relevant countermeasures need to be taken actively to effectively build a long-term mechanism for building third-party assessment teams from colleges and universities for targeted poverty alleviation. 展开更多
关键词 TARGETED poverty alleviation third-party ASSESSMENT Team from college and university WORK EFFECTIVENESS Existing problem Countermeasure
下载PDF
ZTE is First to Pass Third-Party UE TD-LTE Test
16
作者 ZTE Corporation 《ZTE Communications》 2009年第2期46-46,共1页
ZTE Corporation announced on May 13, 2009 that it is the first company to successfully complete and pass the TD-LTE Phase I test together with key industry players including China
关键词 ZTE is First to Pass third-party UE TD-LTE Test LTE TD TEST UE
下载PDF
Study on Strengthening Supervision of the Third-party Laboratory by Suzhou Municipal Government
17
作者 Chaoyong Liu Yucai Wu 《Macro Management & Public Policies》 2021年第2期1-6,共6页
As public service testing structure of testing products,the quality of product testing report issued by the third-party laboratory has a great impact on the healthy development of market economy.In the face of the new... As public service testing structure of testing products,the quality of product testing report issued by the third-party laboratory has a great impact on the healthy development of market economy.In the face of the new situation of rapid economic development,the third-party laboratory develops rapidly,but the government supervision is not in place,which restricts the healthy and orderly development of the third-party laboratory.Therefore,it is very necessary to study how the government effectively supervises the third-party laboratory.This paper takes Suzhou as an example.On the basis of in-depth investigation,using the theory of service government,this paper analyzes the current situation of Suzhou municipal government’s supervision of third-party laboratories,and probes into the problems existing in the supervision and management system,the supervision is not comprehensive,and the independence of the supervision team is not strong.Based on the advanced experience of foreign countries in supervising the third-party laboratory,this paper puts forward some countermeasures and suggestions to promote the Suzhou municipal government to strengthen the supervision of the third-party laboratory from the aspects of improving the implementation rules of laws and regulations,increasing the investment,strengthening the equipment update and team building,increasing the punishment for violations of laws and regulations,and giving full play to the masses and industry supervision. 展开更多
关键词 GOVERNMENT third-party laboratory SUPERVISION
下载PDF
The Influence of Third-party Evaluation on the Development of Detergent Products in China
18
作者 Shi Rongying Shi Aiqin 《China Detergent & Cosmetics》 2019年第2期24-30,共7页
The development and function of the third-party testing platform and the evaluation of detergent products by domestic professional third-party evaluation organizations were summarized. The evaluation methods and index... The development and function of the third-party testing platform and the evaluation of detergent products by domestic professional third-party evaluation organizations were summarized. The evaluation methods and indexes of hand washing dish detergent and fabric detergent by different third-party evaluation organizations were also concluded. The influence of third-party evaluation on the development of detergent products in China is presented. 展开更多
关键词 DISH DETERGENT LAUNDRY DETERGENT LAUNDRY POWDER third-party evaluation
下载PDF
Key Points of Supervision of Third-Party Payment Business:A Comparative Analysis of China's Mainland and Macao
19
作者 Yanling Huang 《Proceedings of Business and Economic Studies》 2022年第3期1-8,共8页
China's Mainland has witnessed remarkable achievements in payment innovations based on internet and financial technologies in recent years,whereas Macao has made little progress in financial technologies,especiall... China's Mainland has witnessed remarkable achievements in payment innovations based on internet and financial technologies in recent years,whereas Macao has made little progress in financial technologies,especially in payment technologies.Based on the concept and types of third-party payment business in China's Mainland and Macao,as well as to investigate the causes for Macao’s lack of innovation in third-party payment,this study compares their differences from two aspects:business licensing authorities and key points of supervision.By comparison,although the classification and methods of third-party payment businesses are different between China's Mainland and Macao,they are all managed and licensed by a unified supervision department.Moreover,the key points of supervision in both places are similar,but unlike China's Mainland,which takes financial risk prevention as the principle and financial technology as the means to encourage innovation,Macao showed obvious deficiencies.In order to further deepen the connection between the financial markets of China's Mainland and Macao as well as boost financial technologies in Macao,this study aims to provide some suggestions and references for the development of cross-border payment systems. 展开更多
关键词 third-party payment AUTHORITY Key points of supervision Comparative analysis
下载PDF
A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques
20
作者 Burak Cem Kara Can Eyüpoglu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1515-1535,共21页
Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off betw... Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area.When existing approaches are investigated,one of the most significant difficulties discovered is the presence of outlier data in the datasets.Outlier data has a negative impact on data utility.Furthermore,k-anonymity algorithms,which are commonly used in the literature,do not provide adequate protection against outlier data.In this study,a new data anonymization algorithm is devised and tested for boosting data utility by incorporating an outlier data detection mechanism into the Mondrian algorithm.The connectivity-based outlier factor(COF)algorithm is used to detect outliers.Mondrian is selected because of its capacity to anonymize multidimensional data while meeting the needs of real-world data.COF,on the other hand,is used to discover outliers in high-dimensional datasets with complicated structures.The proposed algorithm generates more equivalence classes than the Mondrian algorithm and provides greater data utility than previous algorithms based on k-anonymization.In addition,it outperforms other algorithms in the discernibility metric(DM),normalized average equivalence class size(Cavg),global certainty penalty(GCP),query error rate,classification accuracy(CA),and F-measure metrics.Moreover,the increase in the values of theGCPand error ratemetrics demonstrates that the proposed algorithm facilitates obtaining higher data utility by grouping closer data points when compared to other algorithms. 展开更多
关键词 Data anonymization privacy-preserving data publishing k-anonymITY GENERALIZATION MONDRIAN
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部