-
1
-
-
0041783510
-
Privacy preserving data-mining
-
R. Agrawal and R. Srikant. Privacy preserving data-mining. In SIGMOD, pages 439-450, 2000.
-
(2000)
SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
36948999941
-
-
Irvine, CA: Uni of California, School of Information and Computer Science
-
A. Asuncion and D.J. Newman. UCI Machine Learning Repository, 2007. Irvine, CA: Uni of California, School of Information and Computer Science.
-
(2007)
UCI Machine Learning Repository
-
-
Asuncion, A.1
Newman, D.J.2
-
3
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. J. Bayardo Jr. and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
-
(2005)
ICDE
, pp. 217-228
-
-
Bayardo Jr., R.J.1
Agrawal, R.2
-
5
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B. Chen, K. LeFevre, and R. Ramakrishnan. Privacy skyline: privacy with multidimensional adversarial knowledge. In VLDB, 2007.
-
(2007)
VLDB
-
-
Chen, B.1
Lefevre, K.2
Ramakrishnan, R.3
-
6
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. PODS, 2003.
-
(2003)
PODS
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
7
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. Fung, K. Wang, and P. Yu. Top-down specialization for information and privacy preservation. In ICDE, 2005.
-
(2005)
ICDE
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
9
-
-
85011028519
-
K-Anonymization as spatial indexing: Toward scalable and incremental anonymization
-
T. Iwuchukwu and J. Naughton. k-Anonymization as spatial indexing: Toward scalable and incremental anonymization. In VLDB, 2007.
-
(2007)
VLDB
-
-
Iwuchukwu, T.1
Naughton, J.2
-
10
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, pages 279-288, 2002.
-
(2002)
SIGKDD
, pp. 279-288
-
-
Iyengar, V.1
-
11
-
-
26444479778
-
Optimization by simulated annealing
-
S. Kirkpatrick, C.D. Gelatt and M.P. Vecchi. Optimization by simulated annealing. Science, New Series 220 (4598): 671-680, 1983.
-
(1983)
Science, New Series
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt, C.D.2
Vecchi, M.P.3
-
15
-
-
34548748619
-
Worst-case background knowledge for privacy preserving data publishing
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern. Worst-case background knowledge for privacy preserving data publishing. In ICDE, 2007.
-
(2007)
ICDE
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
16
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, pages 223-228, 2004.
-
(2004)
PODS
, pp. 223-228
-
-
Meyerson, A.1
Williams, R.2
-
17
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
M. Nergiz, M. Atzori, and C. W. Clifton. Hiding the presence of individuals from shared databases. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Nergiz, M.1
Atzori, M.2
Clifton, C.W.3
-
19
-
-
46649101105
-
Maintaining k-anonymity against incremental updates
-
J. Pei, J. Xu, Z. Wang, W. Wang, and K. Wang. Maintaining k-anonymity against incremental updates. In SSDBM, 2007.
-
(2007)
SSDBM
-
-
Pei, J.1
Xu, J.2
Wang, Z.3
Wang, W.4
Wang, K.5
-
20
-
-
85011019712
-
The Boundary between Privacy and Utility in Data Publishing
-
V. Rastogi, S. Hong, and D. Suciu. The Boundary Between Privacy and Utility in Data Publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Rastogi, V.1
Hong, S.2
Suciu, D.3
-
21
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
P.Samarati. Protecting respondents' identities in microdata release. In TKDE, 13(6): 1010-1027, 2001.
-
(2001)
TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
22
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
-
(1998)
PODS
-
-
Samarati, P.1
Sweeney, L.2
-
24
-
-
52649134322
-
On Anti-Corruption Privacy Preserving Publication
-
Y. Tao, X. Xiao, J. Li, D. Zhang. On Anti-Corruption Privacy Preserving Publication. In ICDE, 2008.
-
(2008)
ICDE
-
-
Tao, Y.1
Xiao, X.2
Li, J.3
Zhang, D.4
-
25
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B.C.M. Fung, and P.S. Yu. Template-based privacy preservation in classification problems. In ICDM, 2005.
-
(2005)
ICDM
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
26
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R.C. Wong, A.W. Fu, K. Wang, J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007.
-
(2007)
VLDB
-
-
Wong, R.C.1
Fu, A.W.2
Wang, K.3
Pei, J.4
-
27
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In VLDB, pages 139-150, 2006.
-
(2006)
VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
|