-
1
-
-
77049087087
-
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, 3363, pp. 246-258. Springer, Heidelberg (2004)
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing Tables. In: Eiter, T., Libkin, L. (eds.) ICDT 2005. LNCS, vol. 3363, pp. 246-258. Springer, Heidelberg (2004)
-
-
-
-
3
-
-
34548547007
-
-
Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Blocking anonymity threats raised by frequent itemset mining. In: Proc. of 5th IEEE Int'l Conf. on Data Mining, ICDM 2005, pp. 561-564 (2005)
-
Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Blocking anonymity threats raised by frequent itemset mining. In: Proc. of 5th IEEE Int'l Conf. on Data Mining, ICDM 2005, pp. 561-564 (2005)
-
-
-
-
5
-
-
38049126170
-
Efficient k-Anonymization using clustering techniques
-
Kotagiri, R, Radha Krishna, P, Mohania, M, Nantajeewarawat, E, eds, DASFAA 2007, Springer, Heidelberg
-
Byun, J., Kamra, A., Bertino, E., Li, N.: Efficient k-Anonymization using clustering techniques. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol. 4443, pp. 188-200. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4443
, pp. 188-200
-
-
Byun, J.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
6
-
-
41849138431
-
Utility Preserving k-Anonymity
-
Technical report MUN-CS 2006-01, Dept. Computer Science, Memorial University
-
Chaytor, R.: Utility Preserving k-Anonymity. Technical report MUN-CS 2006-01, Dept. Computer Science, Memorial University (2006)
-
(2006)
-
-
Chaytor, R.1
-
7
-
-
28444499680
-
-
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc. of 21st IEEE Int'l Conf. on Data Engineering, ICDE 2005, pp. 205-216 (2005)
-
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proc. of 21st IEEE Int'l Conf. on Data Engineering, ICDE 2005, pp. 205-216 (2005)
-
-
-
-
8
-
-
0242625276
-
-
Iyengar, V.: Transforming data to satisfy privacy constraints. In Proc. of 8th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2002, pp. 279-288 (2002)
-
Iyengar, V.: Transforming data to satisfy privacy constraints. In Proc. of 8th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2002, pp. 279-288 (2002)
-
-
-
-
9
-
-
26444563363
-
-
Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: Proc. of 19th IFIP WG 11.3 Working Conf. on Data and Applications Security, DBSec 2005, pp. 166-177 (2005)
-
Jiang, W., Clifton, C.: Privacy-preserving distributed k-anonymity. In: Proc. of 19th IFIP WG 11.3 Working Conf. on Data and Applications Security, DBSec 2005, pp. 166-177 (2005)
-
-
-
-
11
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Int'l Conf. on Data, Engineering, ICDE 2007 2007
-
Koudas, N., Srivastava, D., Yu, T., Zhang, Q.: Aggregate query answering on anonymized tables. In: Proc. of 23rd IEEE Int'l Conf. on Data, Engineering, ICDE 2007 (2007)
-
Proc. of 23rd IEEE
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
12
-
-
29844444250
-
Incognito: Efficient full-domain kanonymity
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Incognito: Efficient full-domain kanonymity. In: Proc. of 2005 ACM SIGMOD Int'l Conf. on Management of Data, pp. 49-60 (2005)
-
(2005)
Proc. of 2005 ACM SIGMOD Int'l Conf. on Management of Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
13
-
-
33749606641
-
Mondrian multidimensional kanonymity
-
Int'l Conf. on Data Engineering, ICDE 2006 2006
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Mondrian multidimensional kanonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
-
Proc. of 22nd IEEE
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
14
-
-
33749568323
-
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Workload-aware anonymization. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 277-286 (2006)
-
LeFevre, K., DeWitt, D., Ramakrishnan, R.: Workload-aware anonymization. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 277-286 (2006)
-
-
-
-
15
-
-
34548805858
-
S.: T-closeness: privacy beyond k-anonymity and ℓ-diversity
-
Int'l Conf. on Data Engineering, ICDE 2007 2007
-
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and ℓ-diversity. In: Proc. of IEEE 23rd Int'l Conf. on Data Engineering, ICDE 2007 (2007)
-
Proc. of IEEE 23rd
-
-
Li, N.1
Li, T.2
Venkatasubramanian3
-
16
-
-
0038756070
-
A genetic algorithm based approach to route selection and capacity flow assignments
-
Lin, X., Kwok, Y., Lau, V.: A genetic algorithm based approach to route selection and capacity flow assignments. Computer Communications 26(9), 961-974 (2003)
-
(2003)
Computer Communications
, vol.26
, Issue.9
, pp. 961-974
-
-
Lin, X.1
Kwok, Y.2
Lau, V.3
-
17
-
-
33750227747
-
A crossover operator for the k-anonymity problem
-
Lunacek, M., Whitley, D., Ray, I.: A crossover operator for the k-anonymity problem. In: Proc. of 7th ACM Genetic and Evolutionary Computation Conf., GECCO 2006, pp. 1713-1720 (2006)
-
(2006)
Proc. of 7th ACM Genetic and Evolutionary Computation Conf., GECCO
, pp. 1713-1720
-
-
Lunacek, M.1
Whitley, D.2
Ray, I.3
-
18
-
-
33749607006
-
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: privacy beyond k-anonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: ℓ-diversity: privacy beyond k-anonymity. In: Proc. of 22nd IEEE Int'l Conf. on Data Engineering, ICDE 2006 (2006)
-
-
-
-
21
-
-
52949126571
-
-
Pandey, R., Chattopadhyay, S.: Low power technology mapping for LUT based FPGA - a genetic algorithm approach. In: Proc. of 16th IEEE Int'l Conf. on VLSI Design, VLSI 2003, pp. 79-84 (2003)
-
Pandey, R., Chattopadhyay, S.: Low power technology mapping for LUT based FPGA - a genetic algorithm approach. In: Proc. of 16th IEEE Int'l Conf. on VLSI Design, VLSI 2003, pp. 79-84 (2003)
-
-
-
-
22
-
-
41849091656
-
-
Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical report SRI-CSL-98-04. SRI International, Computer Science Laboratoy (1998)
-
Samarati, P., Sweeney, L.: Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression. Technical report SRI-CSL-98-04. SRI International, Computer Science Laboratoy (1998)
-
-
-
-
24
-
-
85150403464
-
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571-588 (2002)
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571-588 (2002)
-
-
-
-
26
-
-
19544380211
-
-
Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), 3275, pp. 249-256. Springer, Heidelberg (2004)
-
Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization: a data mining solution to privacy protection. In: Perner, P. (ed.) ICDM 2004. LNCS (LNAI), vol. 3275, pp. 249-256. Springer, Heidelberg (2004)
-
-
-
-
27
-
-
28444438967
-
Using Simulated Annealing for k-Anonymity
-
Technical report 2002-07. U.S. Bureau of the Census, Statistical Research Division
-
Winkler, W.: Using Simulated Annealing for k-Anonymity. Technical report 2002-07. U.S. Bureau of the Census, Statistical Research Division (2002)
-
(2002)
-
-
Winkler, W.1
-
28
-
-
33749571958
-
-
Wong, R., Li, J., Fu, A., Wang, K. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 754-759 (2006)
-
Wong, R., Li, J., Fu, A., Wang, K. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. In: Proc. of 12th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, KDD 2006, pp. 754-759 (2006)
-
-
-
-
30
-
-
41849123637
-
Utility-based anonymization for privacy preservation with less information loss
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-based anonymization for privacy preservation with less information loss. ACM SIGKDD Explorations 8(2), 21-30 (2006)
-
(2006)
ACM SIGKDD Explorations
, vol.8
, Issue.2
, pp. 21-30
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
|