-
1
-
-
35048841248
-
-
Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, 2992, pp. 183-199. Springer, Heidelberg (2004)
-
Aggarwal, C.C., Yu, P.S.: A condensation approach to privacy preserving data mining. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 183-199. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
28444449426
-
-
Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE '05, pp. 217-228 (2005)
-
Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: ICDE '05, pp. 217-228 (2005)
-
-
-
-
3
-
-
38049126170
-
-
Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: DASFAA '07, pp. 188-200 (2007)
-
Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-anonymization using clustering techniques. In: DASFAA '07, pp. 188-200 (2007)
-
-
-
-
4
-
-
26944448516
-
Ordinal, continuous and heterogeneous k-anonymity through microaggregation
-
Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Mining and Knowledge Discovery 11(2), 195-212 (2005)
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 195-212
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
5
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung, B.CM., Wang, K., Yu, P.S.: Top-down specialization for information and privacy preservation. In: ICDE, pp. 205-216 (2005)
-
(2005)
ICDE
, pp. 205-216
-
-
Fung, B.C.1
Wang, K.2
Yu, P.S.3
-
6
-
-
0034228041
-
ROCK: A robust clustering algorithm for categorical attributes
-
Guha, S., Rastogi, R., Shim, K.: ROCK: A robust clustering algorithm for categorical attributes. Information Systems 25(5), 345-366 (2000)
-
(2000)
Information Systems
, vol.25
, Issue.5
, pp. 345-366
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
8
-
-
0242625276
-
-
Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: KDD '02, pp. 279-288 (2002)
-
Iyengar, V.S.: Transforming data to satisfy privacy constraints. In: KDD '02, pp. 279-288 (2002)
-
-
-
-
9
-
-
33749606641
-
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional kanonymity. In: ICDE '06, p. 25 (2006)
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional kanonymity. In: ICDE '06, p. 25 (2006)
-
-
-
-
10
-
-
33749568323
-
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD '06, pp. 277-286 (2006)
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD '06, pp. 277-286 (2006)
-
-
-
-
11
-
-
35248900307
-
-
Loukides, G., Shao, J.: Capturing data usefulness and privacy protection in kanonymisation. In: SAC '07, pp. 370-374 (2007)
-
Loukides, G., Shao, J.: Capturing data usefulness and privacy protection in kanonymisation. In: SAC '07, pp. 370-374 (2007)
-
-
-
-
12
-
-
33749607006
-
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: 1-diversity: Privacy beyond k-anonymity. In: ICDE '06, p. 24 (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: 1-diversity: Privacy beyond k-anonymity. In: ICDE '06, p. 24 (2006)
-
-
-
-
15
-
-
34250680246
-
-
Xiao, X., Tao, Y.: Personalized privacy preservation. In: SIGMOD '06, pp. 229-240 (2006)
-
Xiao, X., Tao, Y.: Personalized privacy preservation. In: SIGMOD '06, pp. 229-240 (2006)
-
-
-
-
16
-
-
33749582207
-
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W-C.: Utility-based anonymization using local recoding. In: KDD '06, pp. 785-790 (2006)
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.W-C.: Utility-based anonymization using local recoding. In: KDD '06, pp. 785-790 (2006)
-
-
-
|