基于粗糙集理论的隐私保护数据挖掘研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
数据挖掘在各种数据库应用中扮演着非常重要的角色,它在为人们揭示出数据中的隐含知识并创造出财富的同时,也对人们的隐私和数据安全构成了威胁。随着人们隐私保护意识的加强以及相关法律法规的健全,隐私保护数据挖掘已成为数据挖掘领域中一个比较活跃的研究方向。k-匿名模型是隐私保护中最重要的模型之一,其基本思想是对发布数据集中准标识符的属性值作概化操作,以消除链接攻击,实现个体隐私的保护。但是,数据概化将会增加属性值的不确定性,而且不恰当的概化操作将会造成不必要的信息损失,降低匿名数据的效用性。因此,如何对属性值概化选择合适的粒度层次,实现在保护隐私的同时获得良好的数据效用性,这是亟需解决的一个问题。
     粗糙集理论是一种能够有效地分析不精确、不一致和不完备信息的粒计算模型。然而,传统粗糙集模型及其扩展研究没有考虑决策表中数据具有层次结构。现实世界中,层次型数据是普遍存在的,并广泛应用于数据仓库、层次知识发现和k-匿名模型中。如何扩展现有的粗糙集理论模型及方法,以适应层次型数据处理,这是粗糙集研究中的一个重要问题。另外,分布式挖掘是数据挖掘应用增长较快的领域,分布式环境下隐私保护属性约简是粗糙集研究中的另一个重要问题。
     本文分别以决策表中层次型数据和多源决策表作为研究对象,对粗糙集扩展模型及其在隐私保护数据挖掘方面的应用进行了比较系统地研究,主要完成了以下几项工作:
     (1)针对决策表中层次型数据,结合传统粗糙集理论与全子树概化模式,提出了一种新颖的基于属性值分类的多层粗糙集模型。该模型将传统粗糙集从条件属性集上一个原始单层值域扩展为一个具有不同粒度层次的值域,并将传统粗糙集从论域上一个等价关系扩展为一个嵌套的等价关系序列。同时,研究了多层粗糙集的基本性质和相关嵌套序列度量。这些研究成果将进一步完善和扩展粗糙集理论。
     (2)针对决策表中属性值概化的粒度层次选择问题,结合粗糙集理论的属性约简思想,从粗糙集理论的正区域、信息熵和知识粒度三个角度,提出一种基于多层粗糙集的概化约简概念。概化约简能够在保持原始决策表分类能力不变的前提下,将所有属性值概化到最粗粒度层次,从而避免数据过度概化或概化不足问题。分析了属性约简和概化约简之间的内在关系,揭示属性约简是概化约简的一种特例,提出两种自顶向下逐步细化的正区域概化约简启发式算法。为了避免概化约简的过程,实现直接从正区域嵌套序列中依次提取层次决策规则,提出一种自顶向下逐步细化的多层决策规则挖掘算法。通过标准UCI数据集验证了上述方法的有效性和实用性。这些工作将进一步促进多层粗糙集模型在数据挖掘中的实际应用。
     (3)为了权衡隐私保护和数据效用性,结合粗糙集理论的属性约简思想,引入条件信息熵来度量匿名数据质量的准则,分析了该准则在准标识符的属性值自顶向下逐步细化或自底向上逐步粗化时的重要性质。然后,提出一种高效的引导匿名化操作过程的搜索指标,在此基础上,提出一种自顶向下逐步细化的基于层次条件信息熵的k-匿名启发式算法HCE-TDR。通过理论分析和仿真实验,结果表明HCE-TDR算法能够在保证数据发布满足k-匿名要求的同时,提高在匿名数据上进行分类建模的效果。这些研究工作将拓展多层粗糙集模型的应用范围,同时进一步促进k-匿名模型在隐私保护数据挖掘中的实际应用。
     (4)针对垂直划分多源异构决策表,采用半可信第三方和可交换加密机制,设计了一个安全交集基数协议和安全条件信息熵协议,然后提出了一种基于条件信息熵的垂直分布隐私保护属性约简算法。该算法利用粗糙集信息观的约简理论实现了分布式环境下合作约简任务,使各参与方在不共享其隐私信息的前提下达到集中式属性约简的效果。针对垂直划分多源异构决策表和水平划分多源同构决策表,分别设计一种基于安全交集基数协议的安全相对粒度协议和基于安全点积协议的安全相对粒度协议,并提出一种基于相对粒度的分布式隐私保护分布式属性约简算法。实例验证了上述算法的可行性和有效性。这些研究工作促进了粗糙集理论在分布式环境下隐私保护特征选择方面的应用。
Data mining plays a key role in many database applications, reveals to us the hidden information and data patterns from the normal data. However, when data mining brings us knowledge and profits, it also poses the threat to people's privacy and the data security. With the strengthening of people's privacy protection awareness and the establishment of relevant laws and regulations, Privacy Preserving Data Mining (PPDM for short) has become an active area in data mining research. K-anonymity is one of the most important anonymity models to prevent privacy leakage. The principle is to generalize attribute values on quasi-identifiers before data publishing to avoid linking attacks, and thus to achieve the protection of individual privacy. However, data generalization increases the uncertainty of attribute values, and an improper generalization operation will result in unnecessary loss of information, reduce the utility of the anonymous data. Therefore, it is important to select the right granularity level for providing privacy preservation while improving the data utility.
     Rough set theory is a granular computing model, and can effectively analyze imprecise, inconsistent and incomplete information. One important application of rough sets is attribute reduction and classification rule acquisition in decision tables. However, most of the previous studies on the traditional rough set model and its extensions do not consider decision tables with hierarchical attribute values. Data with hierarchical attribute values are, however, commonly seen in real-world applications, and have been widely used in data warehouses, knowledge discovery at different levels of granularity and the K-anonymity model. It is becoming an important research topic in rough sets to extend the existing theories and approaches of rough sets to deal with hierarchical data. In addition, distributed mining is an area of rapid growth in data mining applications, and privacy preserving attribute reduction in distributed environments is necessary to address important research topic in rough sets.
     With decision tables with hierarchical attribute values and multi-sources as the research object, this dissertation systematically studies an extension model of rough sets and its application in PPDM. The main contributions can be summarized as follows.
     (1) To deal with hierarchical data, we extend Pawlak's rough set model, and propose a novel Multi-Level Rough Set (MLRS for short) based on attribute value taxonomies and full-subtree generalization. MLRS extends the value domains of condition attributes under the original single-level granulation to a domain generalization hierarchy under a multi-level granulation, and extends one equivalence relation on the universe to a nested sequence of equivalence relations. The relationships between Pawlak's rough set and MLRS are studied, and the nested sequence measures of MLRS are discussed. The results of these studies will be further refined and extended in rough set theory.
     (2) To select generalization level of attribute value in a decision table, based on attribute reduction in rough set theory, a novel concept of generalization reduction based on MLRS is presented from three perspectives of the rough set theory, such as positive region, information entropy, and knowledge granulation. Generalization reduction can induce the most abstract multi-level decision table with the same classification ability on the raw decision table, and no other multi-level decision table exists that is more abstract. It can avoid over-generalization or under-generalization. Furthermore, the relationships between attribute reduction in Pawlak's rough set model and generalization reduction in MLRS are discussed, and develop two kinds of positive region heuristic algorithms for computing the generalization reduction which adopt the top-down refinement. Finally, an approach named RMTDR for mining multi-level decision rules is provided. It can avoid the generalization reduction process and mine decision rules from different concept levels. Through standard UCI data sets, experiment results show the validity and effectiveness of the proposed methods. These efforts will further promote the practical application of MLRS in data mining.
     (3) To protect individual privacy while maintaining the utility of the data in building classification models, we make use of attribute reduction in rough set theory, apply the conditional entropy to measure the classification ability of an anonymous table, and develop k-anonymity for classification analysis from the information view of rough sets. We extend general conditional entropy under single-level granulation to a hierarchical conditional entropy under multi-level granulation, and study its properties by dynamically bottom-up coarsening or top-down refining attribute values. Guided by these properties, we develop an efficient search metric for the tradeoff principle between information gain and anonymity loss, and present a novel algorithm for achieving k-anonymity, Hierarchical Conditional Entropy-based Top-Down Refinement (HCE-TDR). Theoretical analysis and experiments on real world datasets show that our algorithm is efficient and improves data utility. These studies will expand the application of MLRS, and further promote the practical application of the k-anonymity model for PPDM.
     (4) To solve the privacy preserving attribute reduction problem for multi-source heterogeneous decision tables, we design a secure set intersection cardinality protocol using semi-trusted third party and commutative encryption, develop a novel secure conditional information entropy protocol, and present a vertical privacy-preserving attribute reduction algorithm based on conditional information entropy. This algorithm can achieve co-reduction using attribute reduction based on the information view of rough set theory, which can perform accurate attribute reduction on the premise of no sharing of private information among participants. Also, to solve the privacy preserving attribute reduction problem for multi-source heterogeneous decision tables, we develop a novel secure relative granularity protocol based on secure set intersection cardinality protocol, and propos a vertical privacy-preserving attribute reduction algorithm based on relative granularity; and to solve the privacy preserving attribute reduction problem for multi-source isomorphic decision tables, we develop a novel secure relative granularity protocol based on secure scalar product protocol, and propos a horizontal privacy-preserving attribute reduction algorithm based on relative granularity. Examples demonstrate the feasibility and effectiveness of the proposed algorithms. These studies promote the rough set theory to applications of privacy protection feature selection in a distributed environment.
引文
[Aggarwal et al.,2006]G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, A. Zhu, Achieving anonymity via clustering, In:Proceedings of the 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems,2006, 153-162
    [Aggarwal,2005] C.C. Aggarwal, On k-anonymity and the curse of dimensionality, In:Proceedings of the 31st International Conference on Very Large Data Bases,2005,901-909
    [Agrawal, Srikant,2000] R. Agrawal, R. Srikant. Privacy-preserving data mining. ACM SIGMOD Record,2000,29(2):439-450
    [Bagallo, Haussler,1990] G. Bagallo, D. Haussler. Boolean feature discovery in empirical learning. Machine learning,1990,5(1):71-99
    [Bayardo,Agrawal,2005] R.J. Bayardo, R. Agrawal, Data privacy through optimal k-anonymization, In:Proceedings of the 21st International Conference on Data Engineering,2005,217-228
    [Beaubouef,Petry,Arora,1998] T. Beaubouef, RE. Petry, GArora. Information-theoretic measures of uncertainty for rough sets and rough relational databases. Information Sciences,1998, 109(1-4):185-195
    [Bhatt,Gopal,2005] R. Bhatt, M. Gopal. On fuzzy-rough sets approach to feature selection. Pattern Recognition Letters,2005,26:965-975
    [Bu et al,2008] Y. Bu, A. Fu, R.C.W. Wong, L. Chen, J. Li, Privacy preserving serial data publishing by role composition, In:Proceedings of the 34th International Conference on Very Large Data Bases,2008,845-856
    [Byun et al,2006] J. Byun, Y. Sohn, E. BertinoE, N. Li, Secure anonymization for incremental datasets, In:Proceedings of the 3rd VLDB Work Shop on Secure Data Management,2006, 48-63
    [Cart,Hamition,1998] C.L. Cart, H.J. Hamition, Efficient attributed-oriented generalization for knowledge discovery from large databases, IEEE Transactions on Knowledge and Data Engineering,1998,10(2):193-208
    [Chakrabarty,Biswas,Nanda,2000] K. Chakrabarty, R. Biswas, S. Nanda. Fuzziness in rough sets. Fuzzy Sets and Systems,2000,110:247-251
    [Chen,Hu,Tang,2009] Y.L. Chen, H.W. Hu, K. Tang, Constructing a decision tree from data with hierarchical class labels, Expert Systems with Applications,2009,36(3):4838-4847
    [Chen,Li,Ruan,2012] H. Chen, T.R. Li, D. Ruan, Maintenance of approximations in incomplete ordered decision systems while attribute values coarsening or refining, Knowledge-Based Systems,2012,31,140-161
    [Chen,Wu,Chang,2012] Y.L. Chen, Y.Y. Wu, R.I. Chang, From data to global generalized knowledge, Decision Support Systems,2012,52(2):295-307
    [Clifton,Kantarcioglu,Vaidya,2002] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin. Tools for privacy preserving distributed data mining. ACM SIGKDD Explorations Newsletter,2002, 4(2):28-34
    [Dai,Wang,Tian,2013] J. Dai, W. Wang, H. Tian, L. Liu, Attribute selection based on a new conditional entropy for incomplete decision systems, Knowledge-Based Systems,2013,39: 207-213
    [Dai,Wang,Xu,2012] J.H. Dai, W.T. Wang, Q. Xu, H.W. Tian, Uncertainty measurement for interval-valued decision systems based on extended conditional entropy, Knowledge-Based Systems,2012,27,443-450
    [Dietterich,1997] T.G Dietterich. Machine-learning research. Al magazine,1997,18(4):97-136.
    [Du et al.,2007] Y. Du, T. Xia, Y.F. Tao Y, et al., On multidimensional k-anonymity with local recoding generalization, In:Proceedings of the 23rd International Conference on Data Engineering,2007,1422-1424
    [Du,Zhan,2002] W. Du, Z. Zhan. Building decision tree classifier on private data. In:Proceedings of the IEEE International Conference on Privacy, Security and Data Mining,2002:1-8
    [Dubois,Prade,1990] D. Dubois, H. Prade, Rough fuzzy sets and fuzzy rough sets, International Journal of General Systems,1990,17(2-3):191-209
    [Emekci,Sahin,Agrawal,2007] F. Emekci, O. Sahin, D. Agrawal, et al. Privacy Preserving decision tree learning over multiple parties. Data & Knowledge Engineering,2007,63(2):348-361
    [Fan,Liau,Liu,2011] T.F. Fan, C.J. Liau, D.R. Liu, Dominance-based fuzzy rough set analysis of uncertain and possibilistic data tables, International Journal of Approximate Reasoning, 2011,52(9):1283-1297
    [Feingold,Corzine,Wyden,2003] M. Feingold, M. Corzine, M. Wyden, M. Nelson. Data-mining moratorium act of 2003. US Senate Bill (proposed),2003.
    [Feng,Miao,Cheng,2010] Q. Feng, D. Miao, Y. Cheng, Hierarchical decision rules mining, Expert Systems with Applications,2010,37(3),2081-2091
    [Fong,Ip,Mohammed,2011] S. Fong, A. Ip, S. Mohammed, A multi-level biomedical classification model by using aggregation and abstraction techniques, In:Proceeding of the International Conference Biomedical Engineering,2011,198-206
    [Friedman,Schuster,2010] A. Friedman, A. Schuster, Data mining with differential privacy, In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2010,493-502.
    [Friedman,Wolff, Schuster,2008] A. Friedman, R. Wolff, A. Schuster, Providing k-anonymity in data mining, International Journal of Very Large Data Bases,2008,17(4),789-804
    [Fung et al.,2009] B.C.M. Fung, K. Wang, L.Y. Wang, P.C.K. Hung, Privacy-preserving data publishing for cluster analysis, Data & Knowledge Engineering,2009,68(6),552-575
    [Fung,Wang,Chen,Yu,2010] B.C.M. Fung, K. Wang, R. Chen, P. S. Yu, Privacy-Preserving data publishing:A survey of recent developments, ACM Computer Surveys,2010,42(4):1-5
    [Fung,Wang,Yu,2007]B.C.M. Fung, K. Wang, P.S. Yu, Anonymizing classification data for privacy preservation, IEEE Transactions on Knowledge and Data Engineering,2007,19(5), 711-725
    [Gambs,Kegl,Aimeur,2007] S. Gambs, B. Kegl, E. Aimeur. Privacy-preserving boosting. Data Mining and Knowledge Discovery,2007,14(1):131-170
    [Ghinita,Kalnis,Tao,2011] G. Ghinita, P. Kalnis, Y. Tao, Anonymous publication of sensitive transactional data, IEEE Transactions on Knowledge and Data Engineering,2011,23(2): 161-174
    [Goldreich,1998] O. Goldreich. Secure multi-party computation (working draft,1998). In: http://www.wisdom.weizmann.ac.il/~oded/pp.html
    [Guan,Bell,19981 J.W. Guan, D.A. Bell, Rough computational methods for information systems, Artificial Intelligence,1998,105(1/2):77-103.
    [Guan,Wang,2006] Y.Y. Guan, H.K. Wang, Set-valued information systems. Information Sciences, 2006,176(17):2507-2525
    [Guan,Wang,Wang,2009] Y.Y. Guan, H.K. Wang, Y. Wang, F. Yang, Attribute reduction and optimal decision rules acquisition for continuous valued information systems, Information Sciences,2009,179(17):2974-2984
    [Gutwirth,2002] S. Gutwirth. Privacy and the information age. Rowman & Littlefield Publishers, 2002.
    [Han,Cai,Cercone,1992] J. Han, Y. Cai, N. Cercone. Knowledge discovery in databases:An attribute-oriented approach. In:Proceedings of the 18th International Conference on Very Large Data Bases,1992:547-547
    [Han,Cai,Cercone,1993] J. Han, Y. Cai, N. Cercone. Data-driven discovery of quantitative rules in relational databases. IEEE Transactions on Knowledge and Data Engineering,1993,5(1): 29-40
    [Han,Fu,1994] J. Han and Y. Fu. Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases. In:Proceedings of AAAl'94 Workshop on Knowledge Discovery in Databases (KDD'94),1994,157-168.
    [Han,Fu,1995] J. Han,Y. Fu. Discovery of multiple-level association rules from large databases. In: Proceedings of the 21th International Conference on Very Large Data Bases,1995, 420-431
    [Han,Fu,1999] J. Han,Y. Fu. Mining multiple-level association rules in large databases. IEEE Transactions Knowledge and Data Engineering,1999,11(5):798-805,1999
    [Han,Kamber,Pei,20111 J. Han, M. Kamber, J. Pei. Data Mining:Concepts and Techniques (Third Edition.). Morgan Kaufman,2011.
    [Hong,Lin,Lin.,2008] T.P. Hong, C.E. Lin, J.H. Lin, S.L.Wang, Learning cross-level certain and possible rules by rough sets, Expert Systems with Applications,2008,34(3),1698-1706.
    [Hong,Liou,Wang,2009] T.P. Hong, Y.L. Liou, S.L.Wang, Fuzzy rough sets with hierarchical quantitative attributes. Expert Systems with Applications,2009,36(3):6790-6799.
    [Hong,Wang,Wang,2000]T.P. Hong, T.T. Wang, S.L. Wang, B.C. Chien. Learning a coverage set of maximally general fuzzy rules by rough sets. Expert systems with applications,2000, 19(2):97-103.
    [Hu,An,Yu,2010] Q.H. Hu, S. An, D.R. Yu, Soft fuzzy rough sets for robust feature evaluation and selection, Information Sciences,2010,180(22):4384-4400
    [Hu,Cercone,1995] X.H. Hu, N. Cercone. Learning in relational databases:a rough set approach. International Journal of Computational Intelligence,1995,11(2):323-338
    [Hu,Cercone,1996] X. Hu, N. Cercone. Mining knowledge rules from databases:A rough set approach. In:Proceedings of the twelfth International Conference on Data Engineering, 1996:96-105
    [Hu,Cercone,2001] X.H. Hu, N. Cercone, Discovering maximal generalized decision rules through horizontal and vertical data reduction, Computational Intelligence,2001,17(4):685-702
    [Hu,Liu,Wu,2008] Q.H. Hu, J.R Liu, C.X. Wu, Neighborhood rough set based heterogeneous feature subset selection, Information Sciences,2008,178(18):3577-3594
    [Hu,Xie,Yu,2007] Q.H. Hu, Z.X. Xie, D.R. Yu, Hybrid attribute reduction based on a novel fuzzy-rough model and information granulation, Pattern Recognition,2007,40:3509-3521
    [Huang,Wu,2002] Y.F. Huang, C.M. Wu, Mining generalized association rules using pruning techniques, In:Proceedings of the Second IEEE International Conference on Data Mining, 2002,227-234
    [Inan, Kantarcioglu, Bertino,2009] A. Inan, M. Kantarcioglu, E. Bertino, Using anonymized data for classification, In:Proceedings of the 25th International Conference on Data Engineering,2009,429-440
    [Inuiguchi,Yoshioka,Kusunoki,2009] M. Inuiguchi, Y. Yoshioka, Y. Kusunoki, Variable-precision dominance-based rough set approach and attribute reduction, International Journal of approximate reasoning,2009,50(8):1199-1214
    [Islam, Brankovic,2011] M.Z. Islam, L. Brankovic, Privacy preserving data mining:A noise addition framework using a novel clustering technique, Knowledge-Based Systems,2011 24(8):1214-1223
    [Iyengar,2002] S.V. lyengar, Transforming data to satisfy privacy constraints, In:Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2002,279-288
    [Jensen,Cline,Guynes,2007] B.K. Jensen, M. Cline, C.S. Guynes, HIPPA, privacy and organizational change:a challenge for management, ACM SIGCAS Computers and Society,2007,37(1):12-17
    [Jo,Na,Oh,2008] H. Jo, Y.C. Na, B. Oh, J. Yang, V. Honavar, Attribute value taxonomy generation through matrix based adaptive genetic algorithm, In:Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence,2008,393-400
    [Joo,Zhang,Yang,2004] J. Joo, J. Zhang, J. Yang, and V. Honavar. Generating AVTs using GA for learning decision tree classifiers with missing data. In:Proceedings of the Seventh International Conference on Discovery Science,2004,347-354
    [Kang,Kim,2011] D.K. Kang, M.J. Kim, Propositionalized attribute taxonomies from data for data-driven construction of concise classifiers, Expert Systems with Applications,2011, 38(10):12739-12746
    [Kang,Silvescu,Zhang,2004] D.K. Kang, A. Silvescu, J. Zhang, V. Honavar. Generation of attribute value taxonomies from data for data-driven construction of accurate and compact classifiers, In:Proceedings of the Fourth IEEE International Conference on Data Mining, 2004,130-137
    [Kang,Sohn,2009] D.K. Kang, K. Sohn, Learning decision trees with taxonomy of propositionalized attributes, Pattern Recognition,2009,42(1):84-92
    [Kantarcioglu,Vaidya,2003] M. Kantarcioglu, J. Vaidya. Privacy preserving naive bayes classifier for horizontally partitioned data. IN:Proceedings of the 2003 IEEE ICDM Workshop on Privacy Preserving Data Mining,2003:3-9
    [Kisilevich,Rokach,Elovici,2010] K. Kisilevich, L. Rokach, Y. Elovici, B. Shapira, Efficient multidimensional suppression for k-anonymity, IEEE Transactions on Knowledge and Data Engineering,2010,22(3):334-347
    [Koudas et al.,2007] N. Koudas, D. Srivastava, T. Yu, Q. Zhang, Aggregate query answering on anonymized tables, In:Proceedings of the 23rd International Conference on Data Engineering,2007,116-125
    [Kryszkiewicz,1998] M. Kryszkiewicz, Rough set approach to incomplete information systems, Information sciences,1998,112(1-4):39-49
    [Kryszkiewicz,20011 M. Kryszkiewicz, Comparative studies of alternative type of knowledge reduction in inconsistent systems. International Journal of Intelligent Systems,2001,16(1): 105-120
    [Kunkle,Zhang,Cooperman,2008] D. Kunkle, D.H. Zhang, G. Cooperman. Mining frequent generalized itemsets and generalized association rules without redundancy. Journal of Computer Science and Technology,2008,23(1):77-102
    [Lee,2007]C.H. Lee. A Hellinger-based discretization method for numeric attributes in classification learning. Knowledge-Based Systems,2007,20(4):419-425.
    [Lee,Hong,Wang,2008] Y.C. Lee, T.P. Hong, T.C. Wang. Multi-level fuzzy mining with multiple minimum supports. Expert Systems with Applications,2008,34(1):459-468
    [LeFevre,DeWitt, Ramakrishnan,2005] K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Incognito: Efficient full-domain k-anonymity, In:Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data,2005,49-60
    [LeFevre,DeWitt, Ramakrishnan,2006] K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, In:Proceedings of the 22nd International Conference on Data Engineering Conference,2006,277-286.
    [LeFevre,DeWitt,Ramakrishnan,2008] K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Workload-aware anonymization techniques for large-scale datasets, ACM Transactions on Database Systems,2008,33(3):1-47
    [Leung,Fischer,Wu,2008] Y. Leung, M.M. Fischer, W.Z. Wu, J.S. Mi, A rough set approach for the discovery of classification rules in interval-valued information systems, International Journal of Approximate Reasoning,2008,47(2):233-246
    [Li et al.,2011] J. Li, J. Liu, M. Baig, R.C.W. Wong, Information based data anonymization for classification utility, Data & Knowledge Engineering,2011,70(12):1030-1045
    [Li et al.,2012] T. Li, N. Li, J. Zhang, et al., Slicing:A new approach for privacy preserving data publishing, IEEE Transactions on Knowledge and Data Engineering,2012,24(3):561-574
    [Li,Li,2009] T. Li, N. Li, On the tradeoff between privacy and utility in data publishing, In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2009,517-526
    [Li,Li,2007] N. Li, T. Li, t-closeness:Privacy beyond k-anonymity and 1-diversity, In:Proceedings of the 23rd International Conference on Data Engineering,2007,106-115
    [Li,Wong,Fu, et al.,2008] J.Y. Li, R.C.W. Wong, A.W.C. Fu, et al., Anonymization by local recoding in data with attribute hierarchical taxonomies, IEEE Transactions on Knowledge and Data Engineering,2008,20(9):1181-1194
    [Lia,Zhang,2008] T.J. Lia, W.X. Zhang, Rough fuzzy approximations on two universes of discourse, Information Seienees,2008,178(3):592-906
    [Liang,Chin,Dang,2002] J.Y. Liang, K.S. Chin, C.Y. Dang. A new method for measuring uncertainty and fuzziness in rough set theory. International Journal of General Systems, 2002,31(4):331-342
    [Liang,Li,Qian,2012] J.Y. Liang, R. Li, Y.H. Qian. Distance:A more comprehensible perspective for measures in rough set theory. Knowledge-Based Systems,2012,27:126-136
    [Liang,Qian,2008] Y.H. Qian, J.Y. Liang, Combination entropy and combination granulation in rough set theory. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2008,16(2):179-193
    [Liang,Shi,Li,2004] J.Y. Liang, Z.Z. Shi, D.Y. Li. The information entropy, rough entropy and knowledge granulation in rough set theory. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2004,12(1):37-46
    [Liang,Shi,Li,2006] J.Y. Liang, Z.Z. Shi, D.Y. Li, M.J. Wireman. The information entropy, rough entropy and knowledge granulation in incomplete information systems. International Journal of General Systems,2006,34(1):641-654
    [Lin,Huang,Liu,1990] T.Y. Lin, K.J. Huang, Q. Liu, W. Chen. Rough sets, neighborhood systems and approximation. In:Proceedings of the Fifth International Symposium on Methodologies of Intelligent Systems,1990:130-141.
    [Lin,Qian,Li,2012] G. Lin, Y. Qian, J. Li, NMGRS:Neighborhood-based multigranulation rough sets, International Journal of Approximate Reasoning,2012,53(7):1080-1093
    [Lin,Wei,2009] J.L. Lin, M.C. Wei, Genetic algorithm based clustering approach for k-anonymization, Expert Systems with Applications,2009,36(6):9784-9792
    [Lindell,Pinkas,2000] Y. Lindell, B. Pinkas. Privacy preserving data mining. In:Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology,2000: 36-54.
    [Liou, Tzeng,2010] J.J.H. Liou, G.H. Tzeng, A dominance-based rough set approach to customer behavior in the airline market, Information Seienees,2010,180(11):2230-2238
    [Lynch,2008] C. Lynch. Big data:How do your data grow? Nature,2008,455(7209):28-29
    [Ma,Sun,2012] W. Ma, B. Sun, Probabilistic rough set over two universes and rough entropy, International Journal of Approximate Reasoning,2012,53(4):608-619
    [Machanavajjhala et al.,2007] A. Machanavajjhala, D. Kifer, J. Gehrke, M. Venkitasubramaniam, 1-Diversity:Privacy Beyond k-Anonymity, ACM Transactions on Knowledge Discovery from Data,2007,1(1):1-52
    [Meyerson,Williams,2006] A. Meyerson, R. Williams, On the complexity of optimal k-anonymity, In:Proceedings of the 23rd ACM SIGACT-SIGMOD-SIGART Symposium on the Principles of Database Systems,2004,223-228
    [Miao,Zhao,Yao,2009] D.Q. Miao, Y. Zhao, Y.Y. Yao, H.X. Li, F.F. Xu, Relative reducts in consistent and inconsistent decision tables of the Pawlak rough set model, Information Sciences,2009,79(24):4140-4150
    [Min,Zhu,2012] F. Min, W. Zhu, Attribute reduction of data with error ranges and test costs, Information Sciences,2012,211:48-67
    [Mjolsness,Deeoste,2001] E. Mjolsness, D. Deeoste. Machine learning for science:state of the art and future prospects. Science,2001,293(14):2051-2055
    [Mohammed et al.,2009] N. Mohammed, B.C.M. Fung, P.C.K. Hung, C.K. Lee, Anonymizing healthcare data:a case study on the blood transfusion service, In:Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009,285-1293
    [Nergiz,Clifton,2007] M.E. Nergiz, C. Clifton. Thoughts on k-anonymization. Data&Knowledge Engineering,2007,63(3):622-645
    [Ni,Chong,2012] W. Ni, Z. Chong, Clustering-oriented privacy-preserving data publishing, Knowledge-Based Systems,2012,35,264-270
    [Ouyang,Wang,Zhang,2010] Y. Ouyang, Z. Wang, H. Zhang. On fuzzy rough sets based on tolerance relations. Information Sciences,2010,180(4):532-542
    [Paillier,1999] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes.In:Proceedings of Advaces in Cryptology-EURCRYPT'99,1592:223-238.
    [Pawlak,1982] Z. Pawlak, Rough Sets, International Journal of Computer and Information Science, 1982,11(5):341-356
    [Pawlak,Skowron,2007] Z. Pawlak, A. Skowron, Rough sets:some extensions, Information Sciences,2007,177(1):28-40
    [Pei et al,2007] J. Pei, J. Xu, Z. Wang, W. Wang, K. Wang. Maintaining k-anonymity against incremental updates, In:Proceedings of the 19th International Conference on Scientific and Statistical Database Management,2007,5-11
    [Plantevit,Laurent,Laurent,2010] M. Plantevit, A. Laurent, D. Laurent, M. Teisseire. Mining multidimensional and multilevel sequential patterns. ACM Transactions on Knowledge Discovery from Data (TKDD),2010,4(1):1-37.
    [Qian,Dang,Liang,2009] Y. Qian, C. Dang, J. Liang, D. Tang, Set-valued ordered information systems, Information Sciences,2009,179(16):2809-2832
    [Qian,Liang,2006] Y.H. Qian, J.Y. Liang. Combination entropy and combination granulation in incomplete information system. Lecture Notes in Artificial Intelligence,2006,4062: 184-190
    [Qian,Liang,Dang,2008] Y.H. Qian, J.Y. Liang, C.Y. Dang. Consistency measure, inclusion degree and fuzzy measure in decision tables. Fuzzy Sets and Systems,2008,159:2353-2377
    [Qian,Liang,Dang,2009] Y. Qian, J. Liang, C. Dang. Knowledge structure, knowledge granulation and knowledge distance in a knowledge base. International Journal of Approximate Reasoning,2009,50(1):174-188
    [Qian,Liang,Pedrycz,2010] Y.H. Qian, J.Y. Liang, W. Pedrycz, C.Y. Dang, Positive approximation: An accelerator for attribute reduction in rough set theory, Artificial Intelligence,2010 174(9/10):597-618
    [Qian,Liang,Yao,2010] Y.H. Qian, J.Y. Liang, Y.Y. Yao, C.Y. Dang, MGRS:A multi-granulation rough set, Information Sciences,2010,180(6):949-970
    [Qian,Liang,Yao,2012] Y.H. Qian, J.Y. Liang, Y.Y. Yao, C.Y. Dang, Incomplete mutigranulation rough set, IEEE Transactions on Systems, Man and Cybernetics, Part A,2010,20:420-430
    [Samarati,2001] P. Samarati, Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering,200,13(6):1010-10271
    [Samarati,Sweeney,1998] Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, IEEE Symposium on Research in Security and Privacy,1998,384-393
    [Sharkey et al.,2008] P. Sharkey, H. Tian, W. Zhang, S. Xu, Privacy-preserving data mining through knowledge model sharing, Privacy, Security, and Trust in KDD, Springer Berlin, Heidelberg,2008,4890:97-115
    [Shen,Chouchoulas,2002] Q. Shen, A. Chouchoulas. A rough-fuzzy approach for generating classification rules. Pattern recognition,2002,35(11):2425-2438
    [Slowinski,Vanderpooten,2000] R. Slowinski, D. Vanderpooten, A generalized definition of rough approximations based on similarity, IEEE Transactions on Knowledge and Data Engineering,2000,12(2):331-336
    [Srikant,Agrawal,1995] R. Srikant, R. Agrawal. Mining generalized association rules, In: Proceedings of the 21st International Conference on Very Large Data Bases,1995, 407-419
    [Sriphaew,Theeramunkong,2004] K. Sriphaew, T. Theeramunkong, Fast algorithms for mining generalized frequent patterns of generalized association rules, IEICE Transactions on Information and Systems,2004, E87-D(3):761-770
    [Staff,2011] S. Staff, Introduction to special section on dealing with data:Challenges and opportunities, Science,2011,331(6018):692-693
    [Sweeney,2002A] L. Sweeney, k-Anonymity:a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems,2002,10(5):557-570
    [Sweeney,2002B] L. Sweeney, Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2002,10(5),571-588
    [Terrovitis,Mamoulis,Kalnis,2008] M. Terrovitis, N. Mamoulis, P. Kalnis, Privacy preserving anonymization of set-valued data, In:Proceedings of the VLDB Endowment,2008, 115-125.
    [Truta,Vinay,2006] T.M. Truta, B. Vinay, Privacy protection:p-sensitive k-anonymity property, In: Proceedings of the 22nd International Conference on Data Engineering Workshops,2006, 94.
    [Tsai,Lee,Yang,2008] C.J. Tsai, C.I. Lee, W.P. Yang. A discretization algorithm based on class-attribute contingency coefficient. Information Sciences,2008,178(3):714-731
    [Vaidya,Clifton,2004] J. Vaidya, C. Clifton. Privacy preserving naive bayes classifier for vertically partitioned data. In:Proceedings of the 4th SIAM International Conference on Data Mining. Philadelphia,2004:522-526
    [Vaidya,Yu,Jiang,2008] J. Vaidya, H. Yu, X. Jiang. Privacy-preserving SVM classification. Knowledge and Information Systems,2008,14(2):161-178
    [Verykios,Bertino,Fovino,2004] VS. Verykios, E. Bertino, I.N. Fovino et al., State-of-the-art in privacy preserving data mining, ACM SIGMOD Record,2004,33(1):50-57
    [Wang,2003] G. Y. Wang, Rough reduction in algebra view and information view, International Journal of Intelligent Systems,2003,8(6):679-688
    [Wang,Fung,2006] K. Wang K, B.C.M. Fung, Anonymizing sequential releases, I In:Proceedings of the 12th International Conference on Knowledge Discovery and Data Mining,2006, 414-423
    [Wang,Fung,Yu,2005] K. Wang, B.C.M. Fung, P.S. Yu, Template-based privacy preservation in classification problems, In:Proceedings of the 5th International Conference on Data Mining,2005,466-473
    [Wang,Liang,Qian,2008] J.H. Wang, J.Y. Liang, Y.H. Qian, C.Y. Dang. Uncertainty measure of rough sets based on a knowledge granulation for incomplete information systems. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2008, 16(2):233-244
    [Wang,Wang,2001] J. Wang, J. Wang. Reduction algorithms based on discemibility matrix:the ordered attributes method. Journal of Computer Science and Technology,2001,16(6): 489-504
    [Wang, Wang,2008] H. Wang, S. Wang. A knowledge management approach to data mining process for business intelligence. Industrial Management & Data Systems,2008,108(5):622-634
    [Wang,Yu,Chakraborty,2004] K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization:a data mining solution to privacy protection, In:Proceedings of the 4th International Conference on Data Mining,2004,249-256
    [Wang,Zhao,An,2005]GY. Wang, J. Zhao, J.J. An, et al.. A comparative study of algebra viewpoint and information viewpoint in attribute reduction, Fundamenta Informatiece,2005,68(3): 289-301
    [Wong et al.,2006] R.W.C. Wong, J. Li, A.W.C. Fu, K. Wang, (a, k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing, In:Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006,754-759
    [Wong,Ziarko,1985] S.K.M. Wong, W. Ziarko. On optimal decision rules in decision tables. Bulletin of Polish Academy of Sciences,1985,33(11-12):693-696
    [Wu,Chen,Cha,2011] Y.Y. Wu, Y.L. Chen, R.I. Cha, Mining negative generalized knowledge from relational databases, Knowledge-Based Systems,201,24(1):134-1451
    [Wu,Kumar,Quinlan,2008]X. Wu, V. Kumar, R.J. Quinlan, et al. Top 10 algorithms in data mining. Knowledge and Information Systems,2008,14(1):1-37
    [Xiao,Tao,2006] X. Xiao, Y. Tao, Anatomy:Simple and effective privacy preservation, In: Proceedings of the 32nd International Conference on Very Large Data Bases,2006, 139-150
    [Xiao,Tao,2007] X. Xiao, Y. Tao. m-Invariance:Towards privacy preserving republication of dynamic datasets, In:Proceedings of the ACM SIGMOD Conferenceon Management of Data,2007,689-700
    [Xu et al.,2006] J. Xu, W. Wang, J. Pei, X.Y. Wang, B. Shi, A.W.C. Fu, Utility-based anonymization using local recoding, In:Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2006,785-790
    [Xu et al.,2008]Y. Xu, B.C.M. Fung, K. Wang, A.W.C. Fu, J. Pei, Publishing sensitive transactions for itemset utility, In:Proceedings of the 8th International Conference on Data Mining, 2008,109-114
    [Xu,Li,Liao,2012]W. Xu, Y. Li, X. Liao, Approaches to attribute reductions based on rough set and matrix computation in inconsistent ordered information systems, Knowledge-Based Systems,2012,27:78-91
    [Xu,Zhang,Zhang,2009] W. Xu, X. Zhang, W. Zhang, Knowledge granulation, knowledge entropy and knowledge uncertainty measure in ordered information systems, Applied Soft Computing,2009,9(4):1244-1251
    [Xu,Zhang,Zhong,2010] W. Xu, X. Zhang, J. Zhong, W. Zhang, Attribute reduction in ordered information systems based on evidence theory, Knowledge and Information Systems,2010, 25(1):169-184
    [Yang,Li,Wang,2012] H.L. Yang, S.G Li, S. Wang, J. Wang, Bipolar fuzzy rough set model on two different universes and its application, Knowledge-Based Systems,2012,35:94-101
    [Yang,Wright,2006] Z.Yang, R.N. Wright. Privacy-preserving computation of Bayesian networks on vertically partitioned data. IEEE Transactions on Knowledge and Data Engineering, 2006,18(9):1253-1264
    [Yang, Yang, Wu,2008] X. Yang, J. Yang, C. Wu, D. Yu, Dominance-based rough set approach and knowledge reductions in incomplete ordered information system, Information Sciences, 2008,178(4):1219-1234
    [Yang,Yu,Yang,2009] X. Yang, D. Yu, J. Yang, L. Wei, Dominance-based rough set approach to incomplete interval-valued information system, Data & Knowledge Engineering,2009, 68(11):1331-1347
    [Yao,1982]A.C. Yao. Protocols for secure computations. In:Proceedings of the 23rd Annual Symposium on Foundations of Computer Science,1982:160-164
    [Yao,1998]Y. Yao, Relational interpretations of neighborhood operators and rough set approximation operators. Information Sciences,1998,111(1-4):239-25.
    [Yao,2001]Y.Y. Yao. Information granulation and rough set approximation. International Journal of Intelligent Systems,2001,16(1):87-104.
    [Yao,2003]Y. Yao, Probabilistic approaches to rough sets, Expert systems,2003,20(5):287-297
    [Yao,2010]Y. Yao. Three-way decisions with probabilistic rough sets. Information Sciences,2010, 180(3):341-353
    [Yao, Wong,1992]Y. Yao, S.K M. Wong. Decision theoretic framework for approximating concepts, International Journal of Man-Machine Studies,1992,37(6):793-809
    [Yao,Yao,2012] Y. Yao, B. Yao, Covering based rough set approximations, Information Sciences, 2012,200:910-107
    [Yao,Zhao,2008] Y. Yao, Y. Zhao, Attribute reduction in decision-theoretic rough set models, Information Sciences,2008,178:3356-3373
    [Ye,Hu,Wu,2010a] M. Ye, X. Hu, C. Wu. Privacy preserving attribute reduction for vertically partitioned data. In:Proceedings of IEEE International Conference on Artificial Intelligence and Computational Intelligence,2010,320-324
    [Ye,Hu,Wu,2010b] M. Ye, X. Hu, C. Wu. Privacy preserving attribute reduction for horizontally partitioned data. In:Proceedings of IEEE International Conference on Intelligent Systems and Knowledge Engineering,2010,315-319
    [Ye,Wu,Hu,2013] M. Ye, X. Wu, X. Hu, D. Hu. Anonymizing classification data using rough set theory. Knowledge-Based Systems,2013,43:82-94
    [Yu,Jiang,Vaidya,2006] H. Yu, X. Jiang, J. Vaidya, Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In:Proceedings of the 2006 ACM Symposium on Applied Computing,2006:603-610
    [Zhan,2007] J. Zhan, Using homomorphic encryption for privacy-preserving collaborative decision tree classification. In:Proceedings of the 2007 IEEE Symposium on Computational Intelligence and Data Mining,2007:637-645
    [Zhang et al.,2006] J. Zhang, D.K. Kang, A. Silvescu, V. Honavar, Learning accurate and concise Naive Bayes classifiers from attribute value taxonomies and data, Knowledge and Information Systems,2006,9(2):157-179
    [Zhang,Honavar,2003] J. Zhang, V. Honavar, Learning decision tree classifiers from attribute value taxonomies and partially specified data, In:Proceedings of the 20th International Conference on Machine Learning,2003,880-887
    [Zhang,Luo,2013] Y.L. Zhang, M.K. Luo, Relationships between covering-based rough sets and relation-based rough sets, Information Sciences,2013,225:55-71
    [Zhang,Zhang,Wu,2009] H.Y. Zhang, W.X. Zhang, W.Z.Wu, On characterization of generalized interval-valued fuzzy rough sets on two universes of discourse, International Journal of Approximate reasoning,2009,51(1):56-70
    [Zhou,2003] Z.H. Zhou. Three perspectives of data mining. Artificial Intelligence,2003,143(1): 139-146
    [Zhou,Huang,Yun,2009] Z. Zhou, L. Huang, Y. Yun. Privacy preserving attribute reduction based on rough set. In:Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining,2009,202-206
    [Zhou,Pei,2003] B. Zhou, J. Pei, The k-anonymity and 1-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems,2011,28(1):47-77
    [Zhu,2011]P. Zhu, Covering rough sets based on neighborhoods:An approach without using neighborhoods, International Journal of Approximate Reasoning,2011,52(3):461-472
    [Zhu,Wang,2007] W. Zhu, F.Y. Wang, On three types of covering rough sets, IEEE Transactions on Knowledge Data Engineering,2007,19(8):1131-1144
    [Zhu,Wang,2012] W. Zhu, F.Y. Wang, The fourth type of covering-based rough sets, Information Sciences,2012,201:80-92
    [Zhu,Wen,2012] P. Zhu, Q. Wen, Information-theoretic measures associated with rough set approximations, Information Sciences,2012,212,33-43
    [Ziarko,1993] W. Ziarko, A variable precision rough set model, Journal of Computer and System Sciences,1993,46(1):39-59
    [Zielinski,Olivier,2010] M.P. Zielinski, M.S. Olivier, On the use of economic price theory to find the optimum levels of privacy and information utility in non-perturbative microdata anonymisation, Data & Knowledge Engineering,2010,69(5):399-423
    [常犁云,王国胤,吴渝,1999]常犁云,王国胤,吴渝.一种Rough Set理论的属性约简及规则提取 方法.软件学报,1999,10(11):1206-1211
    [陈昊,杨俊安,庄镇泉,2012]陈昊,杨俊安,庄镇泉.变精度粗糙集的属性核和最小属性约简算法.计算机学报,2012,35(5):1011-1017.
    [陈红梅,王丽珍,2001]陈红梅,王丽珍.面向属性的量化归纳.计算机研究与发展,2001,38(2):150-156.
    [程继华,施鹏飞,1998]程继华,施鹏飞.多层次关联规则的有效挖掘算法.软件学报,1998,9(12):937-941
    [崇志宏,倪巍伟,刘腾腾,2010]崇志宏,倪巍伟,刘腾腾,张勇.一种面向聚类的隐私保护数据发布方法.计算机研究与发展,2010,47(12):2083-2089
    [郭宇红,童云海,唐世渭,2009]郭宇红,童云海,唐世渭,杨冬青.数据库中的知识隐藏.软件学报,2007,18(11):2782-2799
    [韩建民,岑婷婷,虞慧群,2008]韩建民,岑婷婷,虞慧群.数据表k-匿名化的微聚集算法研究.电子学报,2008,36(10):2021-2029
    [胡峰,王国胤,2007]胡峰,王国胤.属性序下的快速约简算法.计算机学报,2007,30(8):1429-1435
    [胡军,王国胤,张清华,2010]胡军,王国撒,张清华.一种覆盖粗糙模糊集模型.软件学报,2010,21(5):968-977
    [胡清华,于达仁,谢宗霞,2008]胡清华,于达仁,谢宗霞.基于邻域粒化和粗糙逼近的数值属性约简.软件学报,2008,19(3):640-649
    [胡学钢,周循,张晶王,2008]胡学钢,周循,张晶.基于多重多层次关系的分类属性泛化研究.合肥工业大学学报(自然科学版),2008,31(9):1433-1437
    [蒋嵘,李德毅,范建华,2000]蒋嵘,李德毅,范建华.数值型数据的泛概念树的自动生成方法.计算机学报,2000,23(5):471-477
    [李光,王亚东,2012]李光,王亚东.一种改进的基于奇异值分解的隐私保持分类挖掘方法.电子学报,2012,40(4):739-744
    [梁吉业,徐宗本,李月香,2001]梁吉业,徐宗本,李月香.包含度与粗糙集数据分析中的度量,2001,24(5):544-547.
    [林欣,李善平,杨朝晖,2009]林欣,李善平,杨朝晖.LBS中连续查询攻击算法及匿名性度量.软件学报,2009,20(4):1058-1068
    [刘清,黄兆华,刘少辉,1999]刘清,黄兆华,刘少辉,姚力文.带Rough算子的决策规则及数据挖掘中的软计算.计算机研究与发展,1999,36(7):800-804
    [刘少辉,盛秋戬,吴斌,2003]刘少辉,盛秋戬,吴斌,史忠植,胡斐.Rough集高效算法的研究.计算机学报,2003,26(5):524-529
    [刘勇,熊蓉,褚健.,2009]刘勇,熊蓉,褚健.Hash快速属性约简算法.计算机学报,2009,32(8):1493-1499
    [毛宇星,陈彤兵,施伯乐,2011]毛宇星,陈彤兵,施伯乐.一种高效的多层和概化关联规则挖掘方法.软件学报,2011,22(12):2965-2980
    [苗夺谦,范世栋,2002]苗夺谦,范世栋.知识的粒度计算及其应用.系统工程理论与实践,2002,22(1):48-56
    [苗夺谦,胡桂荣,1999]苗夺谦,胡桂荣.知识约简的一种启发式算法.计算机研究与发展,1999,36(6):681-684
    [苗夺谦,王国胤,刘清,2007]苗夺谦,王国胤,刘清.粒计算:过去、现在与展望.北京:科学出 版社,2007
    [苗夺谦,:王珏,1997]苗夺谦,王珏.基于粗糙集的多变量决策树构造方法.软件学报,1997,8(6):425-429
    [苗夺谦,王珏,1999]苗夺谦,王珏.粗糙集理论中概念与运算的信息表示.软件学报,1999,10(2):113-116
    [倪巍伟,陈耿,崇志宏,2012]倪巍伟,陈耿,崇志宏,吴英杰.面向聚类的数据隐藏发布研究.计算机研究与发展,2012,49(5):1095-1104
    [钱进,苗夺谦,张泽华,2011]钱进,苗夺谦,张泽华.云计算环境下知识约简算法.计算机学报,2011,34(12):2332-2343
    [钱宇华,2011]钱宇华.复杂数据的粒化机理与数据建模[D].太原:山西大学,2011.
    [钱宇华,梁吉业,王锋,2011]钱宇华,梁吉业,王锋.面向非完备决策表的正向近似特征选择加速算法.计算机学报,2011,34(3):435-442
    [童云海,陶有东,唐世渭,2010]童云海,陶有东,唐世渭,杨冬青.隐私保护数据发布中身份保持的匿名方法.软件学报,2010,21(4):771-781
    [王波,杨静,2012]王波,杨静.一种基于逆聚类的个性化隐私匿名方法.电子学报,2012,40(5):883-890
    [王德兴,胡学钢,刘晓平,2007]王德兴,胡学钢,刘晓平.一种新颖的基于量化概念格的属性归纳算法.西安交通大学学报,2007,41(2):176-179
    [王德兴,胡学钢,刘晓平,2009]王德兴,胡学钢,刘晓平.量化扩展概念格的属性归纳及多粒度规则挖掘.系统工程学报,2009,24(1):54-61.
    [王国胤,张清华,2008]王国胤,张清华.不同知识粒度下粗糙集的不确定性研究.计算机学报,2008,31(9):1588-1598
    [王国胤,何晓,2003]王国胤,何晓.一种不确定性条件下的自主式知识学习模型.软件学报,2003,14(6):1096-1102
    [王国胤,姚一豫,于洪,2009]王国胤,姚一豫,于洪.粗糙集理论与应用研究综述.计算机学报,2009,32(7):1229-1246
    [王国胤,于洪,杨大春,2002]王国撤,于洪,杨大春.基于条件信息熵的决策表约简.计算机学报,2002,25(7):759-766
    [王国胤,张清华,马希骜,2011]王国胤,张清华,马希骜,杨青山.知识不确定性问题的粒计算模型.软件学报,2011,22(4):676-694
    [王珏,姚一豫,王飞跃,2005]王珏,姚一豫,王飞跃.基于Reduct的“规则+例外”学习.计算机学报,2005,28(11):1778-1789
    [王智慧,许俭,汪卫,施伯乐,2010]王智慧,许俭,汪卫,施伯乐.一种基于聚类的数据匿名方法.软件学报,2010,21(4):680-693
    [吴信东,叶明全,胡东辉等,2012]吴信东,叶明全,胡东辉,吴共庆,胡学钢,王浩.普适医疗信息管理与服务的关键技术与挑战.计算机学报,2012,35(5):827-845.
    [吴英杰,唐庆明,倪巍伟,孙志挥,2012]吴英杰,唐庆明,倪巍伟,孙志挥.基于取整划分函数的k-匿名算法.软件学报,2012,23(8):2138-2148
    [谢宏,程浩忠,牛东晓,2005]谢宏,程浩忠,牛东晓.基于信息熵的粗糙集连续属性离散化算法.计算机学报,2005,28(9):1570-1574.
    [辛燕,鞠时光,2006]辛燕,鞠时光.基于多维数据模型的交叉层关联规则挖掘.小型微型计算机系统,2006,27(4):681-686.
    [熊平,朱天清,2012]熊平,朱天清.基于杂度增益与层次聚类的数据匿名方法.计算机研究与发展,2012,49(7):1545-1552
    [徐久成,史进玲,孙林,2009]徐久成,史进玲,孙林.一种基于相对粒度的决策表约简算法.计算机科学,2009,36(3):205-207.
    [徐章艳,刘作鹏,杨炳儒,2006]徐章艳,刘作鹏,杨炳儒,宋威.一个复杂度为max(O(|C||U|,O(|C|2|U/C|)的快速属性约简算法.计算机学报,2006,29(3):391-399.
    [杨高明,杨静,张健沛,2011]杨高明,杨静,张健沛.聚类的(α,k-匿名数据发布.电子学报,2011,39(8):1941-1946
    [杨静,王波,2012]杨静,王波.一种基于最小选择度优先的多敏感属性个性化1-多样性算法.计算机研究与发展,2012,49(12):2603-2610
    [杨明,吴永芬,2008]杨明,吴永芬.一种基于水平分布的多决策表全局属性核求解算法.控制与决策,2008,23(2):127-132
    [杨明,杨萍,2008]杨明,杨萍.垂直分布多决策表下基于条件信息熵的近似约简.控制与决策,2008,23(10):1104-1108
    [杨晓春,刘向宇,王斌,2006]杨晓春,刘向宇,王斌,于戈.支持多约束的k-匿名化方法.软件学报,2006,17(5):1222-1231
    [叶明全,胡学钢,伍长荣,2010]叶明全,胡学钢,伍长荣.垂直划分多决策表下基于条件信息熵的隐私保护属性约简.山东大学学报(理学版),2010,45(9):14-19,26.
    [张鹏,唐世渭,2007]张鹏,唐世渭.朴素贝叶斯分类中的隐私保护方法研究.计算机学报,2007730(8):1267-1276.
    [张清华,王国胤,刘显全,2012]张清华,王国胤,刘显全.基于最大粒的规则获取算法.模式识别与人工智能,2012,25(3):388-396
    [张文修,米据生,吴伟志,2003]张文修,米据生,吴伟志.不协调目标信息系统的知识约简.计算机学报,2003,26(1):12-18
    [张燕平,罗斌,姚一豫,2010]张燕平,罗斌,姚一豫,等.商空间与粒计算:结构化问题求解理论与方法.北京:科学出版社,2010.
    [中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会,2013]中华人民共和国国家质量监督检验检疫总局,中国国家标准化管理委员会.信息安全技术公共及商用服务信息系统个人信息保护指南,北京:中国标准出版社,2013.
    [周生炳,张钹,成栋,1999]周生炳,张钹,成栋.基于规则面向属性的数据库归纳的无回溯算法.软件学报,1999,10(7):673-678.
    [周水庚,李丰,陶宇飞,2009]周水庚,李丰,陶宇飞,肖小奎.面向数据库应用的隐私保护研究综述.计算机学报,2009,32(8):847-861
    [朱青,赵桐,王珊,2010]朱青,赵桐,王珊.面向查询服务的数据隐私保护算法.计算机学报,2010,33(8):1315-1323.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700