-
1
-
-
52649106883
-
On the anonymization of sparse, high-dimensional data
-
G. Ghinita, Y. Tao, and P. Kalnis, "On the Anonymization of Sparse, High-Dimensional Data," Proc. IEEE Int'l Conf. Data Eng. (ICDE), pp. 715-724, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 715-724
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
2
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubrama-niam, "l-Diversity: Privacy beyond k-Anonymity," Proc. IEEE Int'l Conf. Data Eng. (ICDE), 2006.
-
(2006)
Proc. IEEE Int'l Conf. Data Eng. (ICDE)
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubrama-Niam, M.4
-
3
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full-Domain k-Anonymity," Proc. ACM SIGMOD, pp. 49-60, 2005.
-
(2005)
Proc. ACM SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
7
-
-
0001944742
-
Similarity search in high dimensions via hashing
-
A. Gionis, P. Indyk, and R. Motwani, "Similarity Search in High Dimensions via Hashing," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 518-529, 1999.
-
(1999)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 518-529
-
-
Gionis, A.1
Indyk, P.2
Motwani, R.3
-
9
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 770-781, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 770-781
-
-
Chen, B.-C.1
Lefevre, K.2
Ramakrishnan, R.3
-
10
-
-
0041783510
-
Privacy preserving data mining
-
R. Agrawal and R. Srikant, "Privacy Preserving Data Mining," Proc. ACM SIGMOD, pp. 439-450, 2000.
-
(2000)
Proc. ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
11
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du, and B. Chen, "Deriving Private Information from Randomized Data," Proc. ACM SIGMOD, pp. 37-48, 2005.
-
(2005)
Proc. ACM SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
12
-
-
33749568323
-
Workload-aware anonymization
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Workload-Aware Anonymization," Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD), pp. 277-286, 2006.
-
(2006)
Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD)
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
13
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov./Dec.
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
14
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving Anonymity via Clustering," Proc. ACM Symp. Principles of Database Systems (PODS), pp. 153-162, 2006.
-
(2006)
Proc. ACM Symp. Principles of Database Systems (PODS)
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
15
-
-
84988315609
-
Fast data anonymization with low information loss
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis, "Fast Data Anonymization with Low Information Loss," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 758-769, 2007.
-
(2007)
Proc. Int'l Conf. Very Large Data Bases (VLDB)
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
16
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Q. Zhang, N. Koudas, D. Srivastava, and T. Yu, "Aggregate Query Answering on Anonymized Tables," Proc. IEEE Int'l Conf. Data Eng. (ICDE), pp. 116-125, 2007.
-
(2007)
Proc. IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 116-125
-
-
Zhang, Q.1
Koudas, N.2
Srivastava, D.3
Yu, T.4
-
17
-
-
45749101998
-
Anonymity preserving pattern discovery
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi, "Anonymity Preserving Pattern Discovery," VLDB J., vol. 17, pp. 703-727, 2008.
-
(2008)
VLDB J.
, vol.17
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
18
-
-
2142754478
-
Association rule hiding
-
Apr.
-
V. Verykios, A. Elmagarmid, E. Bertino, Y. Saygin, and E. Dasseni, "Association Rule Hiding," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 4, pp. 434-447, Apr. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.1
Elmagarmid, A.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
19
-
-
70449134527
-
On privacy-preservation of text and sparse binary data with sketches
-
C.C. Aggarwal and P.S. Yu, "On Privacy-Preservation of Text and Sparse Binary Data with Sketches," Proc. SIAM Conf. Data Mining, 2007.
-
(2007)
Proc. SIAM Conf. Data Mining
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
21
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A.W.-C. Fu, and P.S. Yu, "Anonymizing Transaction Databases for Publication," Proc. SIGKDD, pp. 767-775, 2008.
-
(2008)
Proc. SIGKDD
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.W.-C.3
Yu, P.S.4
-
22
-
-
0022699275
-
Data compression and gray-code sorting
-
D. Richards, "Data Compression and Gray-Code Sorting," Information Processing Letters, vol. 22, pp. 201-205, 1986.
-
(1986)
Information Processing Letters
, vol.22
, pp. 201-205
-
-
Richards, D.1
-
23
-
-
28444450446
-
Compressing bitmap indices by data reorganization
-
A. Pinar, T. Tao, and H. Ferhatosmanoglu, "Compressing Bitmap Indices by Data Reorganization," Proc. IEEE Int'l Conf. Data Eng. (ICDE), pp. 310-321, 2005.
-
(2005)
Proc. IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 310-321
-
-
Pinar, A.1
Tao, T.2
Ferhatosmanoglu, H.3
-
24
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke, "Injecting Utility into Anonymized Datasets," Proc. ACM SIGMOD, pp. 217-228, 2006.
-
(2006)
Proc. ACM SIGMOD
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
25
-
-
33845913054
-
-
MIT Press
-
A. Andoni, M. Datar, N. Immorlica, P. Indyk, and V. Mirrokni, Nearest Neighbor Methods in Learning and Vision: Theory and Practice. MIT Press, 2006.
-
(2006)
Nearest Neighbor Methods in Learning and Vision: Theory and Practice.
-
-
Andoni, A.1
Datar, M.2
Immorlica, N.3
Indyk, P.4
Mirrokni, V.5
-
26
-
-
34547191587
-
Reducing the total bandwidth of a sparse unsymmetric matrix
-
SIAM
-
J.K. Reid and J.A. Scott, "Reducing the Total Bandwidth of a Sparse Unsymmetric Matrix," SIAM J. Matrix Analysis and Applications, vol. 28, no. 3, pp. 805-821, 2006.
-
(2006)
J. Matrix Analysis and Applications
, vol.28
, Issue.3
, pp. 805-821
-
-
Reid, J.K.1
Scott, J.A.2
-
27
-
-
0016881473
-
The NP-completeness of the bandwidth minimization problem
-
C. Papadimitriou, "The NP-Completeness of the Bandwidth Minimization Problem," Computing, vol. 16, pp. 263-270, 1976.
-
(1976)
Computing
, vol.16
, pp. 263-270
-
-
Papadimitriou, C.1
-
28
-
-
0035788918
-
Real world performance of association rule algorithms
-
Z. Zheng, R. Kohavi, and L. Mason, "Real World Performance of Association Rule Algorithms," Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD), pp. 401-406, 2001.
-
(2001)
Proc. Int'l Conf. Knowledge Discovery and Data Mining (KDD)
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|