-
1
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX USA, May 15, 18
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proceedings of the 2000 ACM SIGMOD on Management of Data, Dallas, TX USA, May 15 - 18 2000, pp. 439-450.
-
(2000)
Proceedings of the 2000 ACM SIGMOD on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, California, USA, May 21-23
-
D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proccedings of the 20th ACM Symposium on Principles of Database Systems, Santa Barbara, California, USA, May 21-23 2001.
-
(2001)
Proccedings of the 20th ACM Symposium on Principles of Database Systems
-
-
Agrawal, D.1
Aggarwal, C.2
-
4
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, Canada, July
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," in Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 2002.
-
(2002)
Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
6
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Atlanta, Georgia, USA, April
-
-, "Mondrian multidimensional k-anonymity," in Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), Atlanta, Georgia, USA, April 2006.
-
(2006)
Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE)
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
8
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan, April
-
B. C. M. Fung, K. Wang, and P. S. Yu, "Top-down specialization for information and privacy preservation," in Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE), Tokyo, Japan, April 2005.
-
(2005)
Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE)
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
9
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression,
-
Tech. Rep
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," Tech. Rep., 1998.
-
(1998)
-
-
Samarati, P.1
Sweeney, L.2
-
10
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Seoul, Korea, September 12-15
-
X. Xiao and Y. Tao, "Anatomy: Simple and effective privacy preservation," in Proceedings of the 32nd Very Large Data Bases conference (VLDB), Seoul, Korea, September 12-15 2006, pp. 139-150.
-
(2006)
Proceedings of the 32nd Very Large Data Bases conference (VLDB)
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
12
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Atlanta, Georgia, USA, April
-
A. Machanavajjhala, J. E. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," in Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE), Atlanta, Georgia, USA, April 2006.
-
(2006)
Proceedings of the 22nd IEEE International Conference on Data Engineering (ICDE)
-
-
Machanavajjhala, A.1
Gehrke, J.E.2
Kifer, D.3
Venkitasubramaniam, M.4
-
14
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
Vienna, Austria, September 23-28
-
B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy skyline: Privacy with multidimensional adversarial knowledge," in Proceedings of VLDB, Vienna, Austria, September 23-28 2007.
-
(2007)
Proceedings of VLDB
-
-
Chen, B.-C.1
LeFevre, K.2
Ramakrishnan, R.3
-
15
-
-
57149145006
-
Worst case background knowledge
-
Istanbul, Turkey, April 15-20
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. E. Gehrke, and J. Halpern, "Worst case background knowledge," in Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, April 15-20 2007.
-
(2007)
Proceedings of the 23rd IEEE International Conference on Data Engineering (ICDE)
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.E.4
Halpern, J.5
-
17
-
-
67649661035
-
On inverse frequet set mining
-
Melbourne, Florida, November 19
-
T. Mielikainen, "On inverse frequet set mining," in Workshop on Privacy Preserving Date Mining, In conjunction with The Third International Conference on Data Mining 2003, Melbourne, Florida, November 19 2003.
-
(2003)
Workshop on Privacy Preserving Date Mining, In conjunction with The Third International Conference on Data Mining 2003
-
-
Mielikainen, T.1
-
18
-
-
34548769227
-
Blocking inference channels in frequent pattern sharing
-
Istanbul, Turkey, April 15-20
-
Z. Wang, W. Wang, and B. Shi, "Blocking inference channels in frequent pattern sharing," in The 23rd IEEE International Conference on Data Engineering, Istanbul, Turkey, April 15-20 2007.
-
(2007)
The 23rd IEEE International Conference on Data Engineering
-
-
Wang, Z.1
Wang, W.2
Shi, B.3
-
19
-
-
33746700004
-
Approximate inverse frequent itemset mining: Privacy, complexity, and approximation
-
Houston, Texam, November 27-30
-
Y. Wang and X. Wu, "Approximate inverse frequent itemset mining: Privacy, complexity, and approximation," in The 5th International Conference on Data Mining 2005, Houston, Texam, November 27-30 2005.
-
(2005)
The 5th International Conference on Data Mining 2005
-
-
Wang, Y.1
Wu, X.2
-
20
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, Washington, USA, August 22-25
-
M. Kantarcioglu, J. Jin, and C. Clifton, "When do data mining results violate privacy?" in Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25 2004.
-
(2004)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
21
-
-
11944266539
-
Information theory and statistical mechanics
-
May
-
E. T. Jaynes, "Information theory and statistical mechanics," Physical Review, vol. 106, no. 4, pp. 620-630, May 1957.
-
(1957)
Physical Review
, vol.106
, Issue.4
, pp. 620-630
-
-
Jaynes, E.T.1
-
22
-
-
0003713964
-
-
Athena Scientific, Belmont, Massachusetts
-
D. P. Bertsekas, Nonlinear Programming. Athena Scientific, Belmont, Massachusetts, 1995.
-
(1995)
Nonlinear Programming
-
-
Bertsekas, D.P.1
-
23
-
-
0002652285
-
A maximum entropy approach to natural language processing
-
A. L. Berger, S. D. Pietra, and V. J. D. Pietra, "A maximum entropy approach to natural language processing," Computational Linguistics, vol. 22, no. 1, pp. 39-71, 1996.
-
(1996)
Computational Linguistics
, vol.22
, Issue.1
, pp. 39-71
-
-
Berger, A.L.1
Pietra, S.D.2
Pietra, V.J.D.3
-
24
-
-
40949106826
-
Knitro: An integrated package for nonlinear optimization
-
G. di Pillo and M. Roma, Eds. Springer-Verlag
-
R. Byrd, J. Nocedal, and R. Waltz, "Knitro: An integrated package for nonlinear optimization," in Large-Scale Nonlinear Optimization, G. di Pillo and M. Roma, Eds. Springer-Verlag, 2006, pp. 35-59.
-
(2006)
Large-Scale Nonlinear Optimization
, pp. 35-59
-
-
Byrd, R.1
Nocedal, J.2
Waltz, R.3
-
25
-
-
67649652876
-
-
The TOMLAB Optimization Environment. URL
-
The TOMLAB Optimization Environment. URL: http://tomopt.com/tomlab/.
-
-
-
-
26
-
-
57149146157
-
Privacy-MaxEnt: Integrating background knowledge in privacy quantification
-
Vancouver, BC, Canada, June 9-12
-
W. Du, Z. Teng, and Z. Zhu, "Privacy-MaxEnt: Integrating background knowledge in privacy quantification," in Proceedings of the ACM SIGMOD International Conference on Management of Data, Vancouver, BC, Canada, June 9-12 2008, pp. 459-472.
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 459-472
-
-
Du, W.1
Teng, Z.2
Zhu, Z.3
-
27
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
Vienna, Austria, September 23-28
-
R. Wong, A. Fu, K. Wang, and J. Pei, "Minimality attack in privacy preserving data publishing," in Proceedings of the 33nd Very Large Data Bases conference (VLDB), Vienna, Austria, September 23-28 2007.
-
(2007)
Proceedings of the 33nd Very Large Data Bases conference (VLDB)
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
28
-
-
66249085387
-
Information disclosure under realistic assumptions: Privacy versus optimality
-
Alexandria, Virginia, October 29-November 2
-
L. Zhang, S. Jajodia, and A. Brodsky, "Information disclosure under realistic assumptions: Privacy versus optimality," in 14th ACM Conference on Computer and Communication Security, Alexandria, Virginia, October 29-November 2 2007.
-
(2007)
14th ACM Conference on Computer and Communication Security
-
-
Zhang, L.1
Jajodia, S.2
Brodsky, A.3
-
29
-
-
33749571958
-
-
α, k-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing, Philadelphia, Pennsylvania, USA, August 20-23
-
R. C.-W.Wong, J. Li, A. W.-C. Fu, and K.Wang, "(α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing," in Proceedings of ACM KDD, Philadelphia, Pennsylvania, USA, August 20-23 2006.
-
(2006)
Proceedings of ACM KDD
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
30
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago,Chile, Sept
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proceedings of International Conference on Very Large Databases (VLDB), Santiago,Chile, Sept 1994, pp. 487-499.
-
(1994)
Proceedings of International Conference on Very Large Databases (VLDB)
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
|