-
1
-
-
0041783510
-
-
R. Agrawal and R. Srikant, Privacy-Preserving Data Mining, SIGMOD 2000.
-
R. Agrawal and R. Srikant, "Privacy-Preserving Data Mining", SIGMOD 2000.
-
-
-
-
4
-
-
77952380096
-
-
S. D. Bay, M. Schwabacher, Mining Distance-Based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule, SIGKDD 2003.
-
S. D. Bay, M. Schwabacher, "Mining Distance-Based Outliers in Near Linear Time with Randomization and a Simple Pruning Rule", SIGKDD 2003.
-
-
-
-
6
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
J. Bentley, "Multidimensional binary search trees used for associative searching". Communications of the ACM, 1975.
-
(1975)
Communications of the ACM
-
-
Bentley, J.1
-
7
-
-
70349154737
-
-
S. Berchtold, D. Keim, and H. Kreigel, The X-tree: an index structure for high dimensional data, In VLDB, 1996.
-
S. Berchtold, D. Keim, and H. Kreigel, "The X-tree: an index structure for high dimensional data", In VLDB, 1996.
-
-
-
-
8
-
-
0039253819
-
-
M. M. Breunig, H. Kriegel, R.T. Ng, J. Sander, LOF: Identifying Density-Based Local Outliers, SIGMOD 2000.
-
M. M. Breunig, H. Kriegel, R.T. Ng, J. Sander, "LOF: Identifying Density-Based Local Outliers", SIGMOD 2000.
-
-
-
-
10
-
-
33745440901
-
Fast Mining of Distance-Based Outliers in High-Dimensional Datasets
-
SIDM
-
A. Ghoting, S. Parthasarathy, M. E. Otey, "Fast Mining of Distance-Based Outliers in High-Dimensional Datasets", SIDM, 2006.
-
(2006)
-
-
Ghoting, A.1
Parthasarathy, S.2
Otey, M.E.3
-
11
-
-
70349124297
-
-
R. Guttmann, A dynamic index structure for spatial searching, In SIGMOD, 1984
-
R. Guttmann, "A dynamic index structure for spatial searching", In SIGMOD, 1984
-
-
-
-
12
-
-
0242625276
-
-
V. S. Iyengar, Transforming data to satisfy privacy constraints, SIGKDD, 2002.
-
V. S. Iyengar, "Transforming data to satisfy privacy constraints", SIGKDD, 2002.
-
-
-
-
13
-
-
29844444250
-
-
K., David DeWitt, and Raghu Ramakrisfman, Incognito: Efficient Full-domain K-anonymity, SIGMOD 2005.
-
K., David DeWitt, and Raghu Ramakrisfman, "Incognito: Efficient Full-domain K-anonymity", SIGMOD 2005.
-
-
-
-
15
-
-
57149132810
-
-
J. Li, Y. Tao, X. Xiao, Preservation of Proximity Privacy in Publishing Numerical Sensitive Data, SIGMOD 2008.
-
J. Li, Y. Tao, X. Xiao, "Preservation of Proximity Privacy in Publishing Numerical Sensitive Data", SIGMOD 2008.
-
-
-
-
18
-
-
34548748619
-
-
ICDE 2007
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, J. Y. Halpern, "Worst-Case Background Knowledge for Privacy-Preserving Data Publishing", ICDE 2007.
-
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
19
-
-
70349092371
-
-
M. Ercan Nergiz, Maurizio Atzori, Christopher W. Clifton, Hiding the Presence of Individuals from Shared Databases, SIGMOD'07.
-
M. Ercan Nergiz, Maurizio Atzori, Christopher W. Clifton, "Hiding the Presence of Individuals from Shared Databases", SIGMOD'07.
-
-
-
-
20
-
-
0034133513
-
Distance-based outliers: Algorithms and applications
-
E. M. Knorr, R. T. Ng, and V. Tucakov, "Distance-based outliers: algorithms and applications", VLDB Journal, 8(3-4):237-253,2000.
-
(2000)
VLDB Journal
, vol.8
, Issue.3-4
, pp. 237-253
-
-
Knorr, E.M.1
Ng, R.T.2
Tucakov, V.3
-
21
-
-
3142691086
-
On the Complexity of Optimal K-anonymity
-
PODS
-
Adam Meyerson, Ryan Williams, "On the Complexity of Optimal K-anonymity", PODS, 2004.
-
(2004)
-
-
Meyerson, A.1
Williams, R.2
-
22
-
-
0039845384
-
-
S. Ramaswamy, R. Rastogi, and K. Shim, Efficient algorithms for mining outliers from large data sets, SIGMOD 2000.
-
S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient algorithms for mining outliers from large data sets", SIGMOD 2000.
-
-
-
-
23
-
-
70349118745
-
Generalizing Data to Provide Anonymity when Disclosing Information
-
PODS
-
P. Samarati, L. Sweendy, "Generalizing Data to Provide Anonymity when Disclosing Information", PODS, 1998.
-
(1998)
-
-
Samarati, P.1
Sweendy, L.2
-
24
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
TKDE
-
P. Samarati, "Protecting respondents' identities in microdata release", TKDE, 2001.
-
(2001)
-
-
Samarati, P.1
-
25
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy", International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557570
-
-
Sweeney, L.1
-
26
-
-
33749571958
-
-
R. Wong, J. Li, A. Fu, K. Wang, (a, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing, SIGKDD, 2006.
-
R. Wong, J. Li, A. Fu, K. Wang, "(a, k)-Anonymity: An Enhanced k-Anonymity Model for Privacy-Preserving Data Publishing", SIGKDD, 2006.
-
-
-
-
29
-
-
33749582207
-
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A. Fu, Utility-Based Anonymization Using Local Recoding, SIGKDD, 2006.
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, A. Fu, "Utility-Based Anonymization Using Local Recoding", SIGKDD, 2006.
-
-
-
|