-
1
-
-
84865066129
-
-
AOL search data scandal
-
AOL search data scandal, http://en.wikipedia.org/wiki/aol search data scandal.
-
-
-
-
2
-
-
84865074368
-
-
Chronicle of AOL search query log release incident
-
Chronicle of AOL search query log release incident, http://sifaka.cs.uiuc.edu/xshen/aol querylog.html.
-
-
-
-
3
-
-
57349112634
-
User 4xxxxx9: Anonymizing query logs
-
E. Adar. User 4xxxxx9: Anonymizing query logs. In Query Logs Workshop at WWW, 2007.
-
(2007)
Query Logs Workshop at WWW
-
-
Adar, E.1
-
4
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proc. of VLDB, 1994.
-
(1994)
Proc. of VLDB
-
-
Agrawal, R.1
Srikant, R.2
-
7
-
-
34250017239
-
A face is exposed for aol searcher no. 4417749
-
August 9
-
M. Barbaro and T. Zeller. A face is exposed for aol searcher no. 4417749. New York Times, August 9, 2006.
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
8
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In Proc. of ICDE, 2005.
-
(2005)
Proc. of ICDE
-
-
Bayardo, R.1
Agrawal, R.2
-
11
-
-
33750357681
-
You are what you say: Privacy risks of public mentions
-
D. Frankowski, D. Cosley, S. Sen, L. Terveen, and J. Riedl. You are what you say: Privacy risks of public mentions. In Proc. of SIGIR, 2006.
-
(2006)
Proc. of SIGIR
-
-
Frankowski, D.1
Cosley, D.2
Sen, S.3
Terveen, L.4
Riedl, J.5
-
13
-
-
52649106883
-
On the anonymization of sparse high-dimensional data
-
G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In Proc.of ICDE, 2008.
-
(2008)
Proc.of ICDE
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
14
-
-
0021615874
-
R-trees: A dynamic index structure for spatial searching
-
A. Guttman. R-trees: A dynamic index structure for spatial searching. In Proc. of ACM SIGMOD, 1984.
-
(1984)
Proc. of ACM SIGMOD
-
-
Guttman, A.1
-
15
-
-
63449090629
-
"I know what you did last summer" - query logs and user privacy
-
R. Jones, R. Kumar, B. Pang, and A. Tomkins. "I know what you did last summer" - query logs and user privacy. In Proc. of CIKM, 2007.
-
(2007)
Proc. of CIKM
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, B.4
-
16
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In Proc of ACM SIGMOD, 2006.
-
(2006)
Proc of ACM SIGMOD
-
-
Kifer, D.1
Gehrke, J.2
-
17
-
-
84865077797
-
Privacy, personalization, and the web: A utility-theoretic approach
-
A. Krause and E. Horvitz. Privacy, personalization, and the web: A utility-theoretic approach. In Proc. of AAAI, 2008.
-
(2008)
Proc. of AAAI
-
-
Krause, A.1
Horvitz, E.2
-
18
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins. On anonymizing query logs via token-based hashing. In WWW, 2007.
-
(2007)
WWW
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
21
-
-
84865074370
-
Anonymization by local recoding in data with attribute hierarchical taxonomies
-
J. Li, R. C. W. Wong, A. W. C. Fu, and J. Pei. Anonymization by local recoding in data with attribute hierarchical taxonomies. IEEE TKDE, 2008.
-
(2008)
IEEE TKDE
-
-
Li, J.1
Wong, R.C.W.2
Fu, A.W.C.3
Pei, J.4
-
22
-
-
34548805858
-
t-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. of ICDE, 2007.
-
(2007)
Proc. of ICDE
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
27
-
-
78651553638
-
Website privacy preservation for query log publishing
-
B. Poblete, M. Spiliopoulou, and R. Baeza-Yates. Website privacy preservation for query log publishing. In Proc. of the First International Workshop on on Privacy, Security, and Trust in KDD, 2007.
-
(2007)
Proc. of the First International Workshop on on Privacy, Security, and Trust in KDD
-
-
Poblete, B.1
Spiliopoulou, M.2
Baeza-Yates, R.3
-
28
-
-
33744584654
-
Induction of decision trees
-
J. Quinlan. Induction of decision trees. In Machine Learning, 1986.
-
(1986)
Machine Learning
-
-
Quinlan, J.1
-
29
-
-
1142294784
-
Maintaining privacy in association rule mining
-
S. Rizvi and J. Haritsa. Maintaining privacy in association rule mining. In Proc. of VLDB, 2002.
-
(2002)
Proc. of VLDB
-
-
Rizvi, S.1
Haritsa, J.2
-
33
-
-
2142754478
-
Association rule hiding
-
V. Verykios, A. Elmagarmid, E. bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE TKDE, 16:434-447, 2004.
-
(2004)
IEEE TKDE
, vol.16
, pp. 434-447
-
-
Verykios, V.1
Elmagarmid, A.2
bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
34
-
-
84865078947
-
(a, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing
-
R. Wong, Y. Liu, J. Yin, Z. Huang, W. Fu, and J. Pei. (a, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In Proc. of SIGKDD, 2007.
-
(2007)
Proc. of SIGKDD
-
-
Wong, R.1
Liu, Y.2
Yin, J.3
Huang, Z.4
Fu, W.5
Pei, J.6
-
35
-
-
79957809018
-
Anatomy: Simple and effective privacy preservation
-
X. Xiao and Y. Tao. Anatomy: Simple and effective privacy preservation. In Proc. of ACM SIGMOD, 2007.
-
(2007)
Proc. of ACM SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
36
-
-
35448967088
-
m-invariance: Towards privacy preserving re-publication of dynamic datasets
-
X. Xiao and Y. Tao. m-invariance: Towards privacy preserving re-publication of dynamic datasets. In Proc. of SIGMOD, 2007.
-
(2007)
Proc. of SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
37
-
-
57149127223
-
Dynamic anonymization: Accurate statistical analysis with privacy preservation
-
X. Xiao and Y. Tao. Dynamic anonymization: Accurate statistical analysis with privacy preservation. In Proc. of SIGMOD, 2008.
-
(2008)
Proc. of SIGMOD
-
-
Xiao, X.1
Tao, Y.2
-
39
-
-
33749582207
-
Utility-based anonymization using local recoding
-
J. Xu, W. Wang, J. Pei, X. Wang, B. Shi, and A. Fu. Utility-based anonymization using local recoding. In Proc. of SIGKDD, 2006.
-
(2006)
Proc. of SIGKDD
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
-
40
-
-
67049167712
-
Publishing sensitive transactions for itemset utility
-
Y. Xu, B. C. M. Fung, K. Wang, A. W.-C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In ICDM, 2008.
-
(2008)
ICDM
-
-
Xu, Y.1
Fung, B.C.M.2
Wang, K.3
Fu, A.W-C.4
Pei, J.5
-
41
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A. W. C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In KDD, 2008.
-
(2008)
KDD
-
-
Xu, Y.1
Wang, K.2
Fu, A.W.C.3
Yu, P.S.4
-
42
-
-
0035788918
-
Real world performance of association rule algorithms
-
Z. Zheng, R. Kohavi, and L. Mason. Real world performance of association rule algorithms. In Proc. of KDD, 2001.
-
(2001)
Proc. of KDD
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|