[1] |
廖方宇, 洪学海, 汪洋, 褚大伟 . 数据与计算平台是驱动当代科学研究发展的重要基础设施[J]. 数据与计算发展前沿, 2019,1(1):2-10.
|
[2] |
李晓荣, 田双 . 高校新型语言实验室建设及管理探析[J]. 教育现代化, 2018 ( 51):131.
|
[3] |
王宇飞 . 大数据时代隐私权的法律保护研究[D]. 广西师范大学, 2019.
|
[4] |
中华人民共和国网络安全法. 新疆农垦科技, 2017,40(1):80-82.
|
[5] |
Regulation GDP . Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC[J]. Official Journal of the European Union (OJ), L119, 2016: 294.
|
[6] |
Hense P, Fischer C . Kaliforniens neues Datenschutz-gesetz: Der “California Consumer Privacy Act of 20 18\” (CCPA)[J]. Datenschutz Berater, 2019,43(2):26-27.
|
[7] |
张笑宇, 沈超, 陈宇飞, 吴星辉, 刘畅 . 智能语音系统安全分析[J]. 数据与计算发展前沿, 2019,1(2):98-109.
|
[8] |
常伟 . 大数据背景下的智慧型语言实验室的构建[J]. 信息与电脑 (理论版), 2019 ( 1):43.
|
[9] |
胡伏湘 . 基于大数据平台的智慧教育方法研究[J]. 湖南行政学院学报, 2017 ( 1):30-34.
|
[10] |
张薇 . 大数据背景下语料库在英语教学与科研中的应用[J]. 新丝路, 2017 ( 18):117-117.
|
[11] |
詹卫东 . 大数据时代的汉语语言学研究[J]. 山西大学学报:哲学社会科学版, 2013,036(005):70-77.
|
[12] |
梁君英, 刘海涛 . 语言学的交叉学科研究:语言普遍性,人类认知,大数据[J]. 浙江大学学报:人文社会科学版, v. 46(01):108-118.
|
[13] |
孙哲南, 张兆翔, 王威, 刘菲, 谭铁牛 . 2019年人工智能新态势与新进展[J]. 数据与计算发展前沿, 2019,1(2):1-16.
|
[14] |
方滨兴, 贾焰, 李爱平 , 等. 大数据隐私保护技术综述[J]. 大数据, 2016,2(1):1-18.
|
[15] |
施蓉蓉 . 高校图书馆数字资源云存储模式探究[J]. 图书馆研究, 2019,42(3):32-34.
|
[16] |
Sweeney L . k-anonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002,10(05):557-570.
doi: 10.1142/S0218488502001648
|
[17] |
achanavajjhala A, Gehrke J, Kifer D, et al. l-diversity: Privacy beyond k-anonymity[C]// 22nd International Conference on Data Engineering (ICDE’06). IEEE, 2006: 24-24.
|
[18] |
Li N, Li T, Venkatasubramanian S. t-closeness: Privacy beyond k-anonymity and l-diversity[C]// 2007 IEEE 23rd International Conference on Data Engineering. IEEE, 2007: 106-115.
|
[19] |
Wong C W, Fu W C, Ke W, et al. Minimality attack in privacy preserving data publishing[C]// International Conference on Very Large Data Bases. 2007.
|
[20] |
Dwork C . Differential privacy[J]. Lecture Notes in Computer Science, 2006,26(2):1-12.
|
[21] |
陈性元, 高元照, 唐慧林 , 等. 大数据安全技术研究进展[J]. 中国科学: 信息科学, 2020 ( 1):2.
|
[22] |
Cheon J H, Kim M, Kim M. Search-and-compute on encrypted data[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015: 142-159.
|
[23] |
Chen X, Huang Q. The data protection of MapReduce using homomorphic encryption[C]// Software Engineering and Service Science (ICSESS), 2013 4th IEEE International Conference on. IEEE, 2013: 419-421.
|
[24] |
Brakerski Z, Vaikuntanathan V . Efficient fully homomorphic encryption from (standard) LWE[J]. SIAM Journal on Computing, 2014,43(2):831-871.
doi: 10.1137/120868669
|
[25] |
Zhao C, Zhao S, Zhao M , et al. Secure multi-party computation: theory, practice and applications[J]. Information Sciences, 2019,476:357-372.
doi: 10.1016/j.ins.2018.10.024
|
[26] |
Li L, Yu S, Xiang W , et al. An improved Apriori-based algorithm for friends recommendation in microblog[J]. International Journal of Communication Systems, 2018,31(2):e3453
doi: 10.1002/dac.v31.2
|