-
2
-
-
34250661905
-
Achieving Anonymity via Clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering," Proc. ACM Symp. Principles of Database Systems (PODS), pp. 153-162, 2006.
-
(2006)
Proc. ACM Symp. Principles of Database Systems (PODS)
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
0003515463
-
-
Prentice-Hall, Inc.
-
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc., 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.K.1
Magnanti, T.L.2
Orlin, J.B.3
-
5
-
-
0026998036
-
From statistics to beliefs
-
F. Bacchus, A. Grove, J. Y. Halpern, and D. Koller, "From Statistics to Beliefs," Proc. Nat'l Conf. Artificial Intelligence (AAAI), pp. 602-608, 1992.
-
(1992)
Proc. Nat'l Conf. Artificial Intelligence (AAAI)
, pp. 602-608
-
-
Bacchus, F.1
Grove, A.2
Halpern, J.Y.3
Koller, D.4
-
6
-
-
33750732631
-
Secure anonymization for incremental datasets
-
J.-W. Byun, Y. Sohn, E. Bertino, and N. Li, "Secure Anonymization for Incremental Datasets," Proc. VLDB Workshop Secure Data Management (SDM), pp. 48-63, 2006.
-
(2006)
Proc. VLDB Workshop Secure Data Management (SDM)
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
7
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 770-781, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 770-781
-
-
Chen, B.-C.1
LeFevre, K.2
Ramakrishnan, R.3
-
8
-
-
84950825763
-
Disclosure-limited data dissemination
-
G. T. Duncan and D. Lambert, "Disclosure-Limited Data Dissemination," J. Am. Statistical Assoc., vol. 81, pp. 10-28, 1986.
-
(1986)
J. Am. Statistical Assoc.
, vol.81
, pp. 10-28
-
-
Duncan, G.T.1
Lambert, D.2
-
9
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
B. C. M. Fung, K. Wang, and P. S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. Int'l Conf. Data Eng. (ICDE), pp. 205-216, 2005.
-
(2005)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
10
-
-
0000797976
-
A class of wasserstein metrics for probability distributions
-
C. R. Givens and R. M. Shortt, "A Class of Wasserstein Metrics for Probability Distributions," Michigan Math J., vol. 31, pp. 231-240, 1984.
-
(1984)
Michigan Math. J.
, vol.31
, pp. 231-240
-
-
Givens, C.R.1
Shortt, R.M.2
-
11
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. S. Iyengar, "Transforming Data to Satisfy Privacy Constraints," Proc. ACM SIGKDD, pp. 279-288, 2002.
-
(2002)
Proc. ACM SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
12
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke, "Injecting Utility into Anonymized Datasets," Proc. ACM SIGMOD, pp. 217-228, 2006.
-
(2006)
Proc. ACM SIGMOD
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
13
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
N. Koudas, D. Srivastava, T. Yu, and Q. Zhang, "Aggregate Query Answering on Anonymized Tables," Proc. Int'l Conf. Data Eng. (ICDE), pp. 116-125, 2007.
-
(2007)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 116-125
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
15
-
-
0000964471
-
Measures of disclosure risk and harm
-
D. Lambert, "Measures of Disclosure Risk and Harm," J. Official Statistics, vol. 9, pp. 313-331, 1993.
-
(1993)
J. Official Statistics
, vol.9
, pp. 313-331
-
-
Lambert, D.1
-
16
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity," Proc. ACM SIGMOD, pp. 49-60, 2005.
-
(2005)
Proc. ACM SIGMOD
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
17
-
-
33749606641
-
Mondrian Multidimensional k-Anonymity
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional k-Anonymity," Proc. Int'l Conf. Data Eng. (ICDE), p. 25, 2006.
-
(2006)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 25
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
18
-
-
33749568323
-
Workload-aware anonymization
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan, "Workload-Aware Anonymization," Proc. ACM SIGKDD, pp. 277-286, 2006.
-
(2006)
Proc. ACM SIGKDD
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
19
-
-
34548805858
-
T-Closeness: Privacy beyond κ-Anonymity and ℓ-Diversity
-
N. Li, T. Li, and S. Venkatasubramanian, "t-Closeness: Privacy beyond κ-Anonymity and ℓ-Diversity," Proc. Int'l Conf. Data Eng. (ICDE), pp. 106-115, 2007.
-
(2007)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
20
-
-
52649086216
-
Injector: Mining background knowledge for data anonymization
-
T. Li and N. Li, "Injector: Mining Background Knowledge for Data Anonymization," Proc. Int'l Conf. Data Eng. (ICDE), 2008.
-
(2008)
Proc. Int'l Conf. Data Eng. (ICDE)
-
-
Li, T.1
Li, N.2
-
21
-
-
39749201160
-
Towards Optimal k-Anonymization
-
T. Li and N. Li, "Towards Optimal k-Anonymization," Data and Knowledge Eng., vol. 65, pp. 22-39, 2008.
-
(2008)
Data and Knowledge Eng.
, vol.65
, pp. 22-39
-
-
Li, T.1
Li, N.2
-
22
-
-
67649641460
-
Modeling and inntegrating background knowledge in data anonymization
-
T. Li, N. Li, and J. Zhang, "Modeling and Inntegrating Background Knowledge in Data Anonymization," Proc. Int'l Conf. Data Eng. (ICDE), 2009.
-
(2009)
Proc. Int'l Conf. Data Eng. (ICDE)
-
-
Li, T.1
Li, N.2
Zhang, J.3
-
23
-
-
33749607006
-
ℓ-Diversity: Privacy beyond κ-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "ℓ-Diversity: Privacy Beyond κ-Anonymity," Proc. Int'l Conf. Data Eng. (ICDE), p. 24, 2006.
-
(2006)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
24
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publishing
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern, "Worst-Case Background Knowledge for Privacy-Preserving Data Publishing," Proc. Int'l Conf. Data Eng. (ICDE), pp. 126-135, 2007.
-
(2007)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 126-135
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
26
-
-
35448937300
-
Hiding the presence of individuals from shared databases
-
M. E. Nergiz, M. Atzori, and C. Clifton, "Hiding the Presence of Individuals from Shared Databases," Proc. ACM SIGMOD, pp. 665-676, 2007.
-
(2007)
Proc. ACM SIGMOD
, pp. 665-676
-
-
Nergiz, M.E.1
Atzori, M.2
Clifton, C.3
-
27
-
-
35448962139
-
Approximate Algorithms for k-Anonymity
-
H. Park and K. Shim, "Approximate Algorithms for k-Anonymity," Proc. ACM SIGMOD, pp. 67-78, 2007.
-
(2007)
Proc. ACM SIGMOD
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
28
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
V. Rastogi, S. Hong, and D. Suciu, "The Boundary between Privacy and Utility in Data Publishing," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 531-542, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 531-542
-
-
Rastogi, V.1
Hong, S.2
Suciu, D.3
-
29
-
-
0034313871
-
The earth mover's distance as a metric for image retrieval
-
Y. Rubner, C. Tomasi, and L. J. Guibas, "The Earth Mover's Distance as a Metric for Image Retrieval," Int'l J. Computer Vision, vol. 40, no. 2, pp. 99-121, 2000.
-
(2000)
Int'l J. Computer Vision
, vol.40
, Issue.2
, pp. 99-121
-
-
Rubner, Y.1
Tomasi, C.2
Guibas, L.J.3
-
30
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
Nov./Dec
-
P. Samarati, "Protecting Respondent's Privacy in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
31
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 6, pp. 571-588, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.6
, pp. 571-588
-
-
Sweeney, L.1
-
32
-
-
0036811662
-
κ-Anonymity: A model for protecting privacy
-
L. Sweeney, "κ-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
36
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B. C. M. Fung, and P. S. Yu, "Template-Based Privacy Preservation in Classification Problems," Proc. Int'l Conf. Data Mining (ICDM), pp. 466-473, 2005.
-
(2005)
Proc. Int'l Conf. Data Mining (ICDM)
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
37
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei, "Minimality Attack in Privacy Preserving Data Publishing," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 543-554, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 543-554
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Pei, J.4
-
38
-
-
33749571958
-
(α, κ)-Anonymity: An enhanced κ-anonymity model for privacy preserving data publishing
-
R. C.-W. Wong, J. Li, A. W.-C. Fu, and K. Wang," (α, κ) -Anonymity: An Enhanced κ-Anonymity Model for Privacy Preserving Data Publishing," Proc. ACM SIGKDD, pp. 754-759, 2006.
-
(2006)
Proc. ACM SIGKDD
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
40
-
-
34250680246
-
Personalized privacy preservation
-
X. Xiao and Y. Tao, "Personalized Privacy Preservation," Proc. ACM SIGMOD, pp. 229-240, 2006.
-
(2006)
Proc. ACM SIGMOD
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
41
-
-
35448967088
-
M-Invariance: Towards privacy preserving republication of dynamic datasets
-
X. Xiao and Y. Tao, "m-Invariance: Towards Privacy Preserving Republication of Dynamic Datasets," Proc. ACM SIGMOD, pp. 689-700, 2007.
-
(2007)
Proc. ACM SIGMOD
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
-
42
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. W.-C. Fu, "Utility-Based Anonymization Using Local Recoding," Proc. ACM SIGKDD, pp. 785-790, 2006.
-
(2006)
Proc. ACM SIGKDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.W.-C.6
|