-
1
-
-
34247336855
-
Mobiscopes for human spaces
-
T. Abdelzaher et al. Mobiscopes for human spaces. IEEE Pervasive Computing, 6(2):20-29, 2007.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.2
, pp. 20-29
-
-
Abdelzaher, T.1
-
2
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Comput. Surv., 21(4):515-556, 1989.
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
3
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proc. of SIGMOD'01, pages 247-255, 2001.
-
(2001)
Proc. of SIGMOD'01
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
4
-
-
0041783510
-
Privacy preserving data mining
-
R. Agrawal and R. Srikant. Privacy preserving data mining. In Proc. of SIGMOD'00, pages 439-450, 2000.
-
(2000)
Proc. of SIGMOD'00
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
8
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In Mobiquitous, pages 109-117, 2005.
-
(2005)
Mobiquitous
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
9
-
-
77954718437
-
Privacy-preserving data publishing
-
B.-C. Chen, D. Kifer, K. LeFevre, and A. Machanavajjhala. Privacy-preserving data publishing. Foundations and Trends in Databases, 2:1-167, 2009.
-
(2009)
Foundations and Trends in Databases
, vol.2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, D.2
Lefevre, K.3
MacHanavajjhala, A.4
-
11
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. Tools for privacy preserving distributed data mining. SIGKDD Explor. Newsl., 4(2):28-34, 2002.
-
(2002)
SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
12
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Cloudcroft, NM
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In Workshop on New security paradigms (NSPW'01), pages 13-22, Cloudcroft, NM, 2001.
-
(2001)
Workshop on New Security Paradigms (NSPW'01)
, pp. 13-22
-
-
Du, W.1
Atallah, M.J.2
-
13
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
W. Du, S. Chen, and Y. S. Han. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In Proc. of 4th SIAM International Conference on Data Mining, pages 222-233, 2004.
-
(2004)
Proc. of 4th SIAM International Conference on Data Mining
, pp. 222-233
-
-
Du, W.1
Chen, S.2
Han, Y.S.3
-
15
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
C. Dwork, K. Kenthapadi, F.McSherry, I.Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Eurocrypt, pages 486-503, 2006.
-
(2006)
Eurocrypt
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
16
-
-
45849122114
-
The bikenet mobile sensing system for cyclist experience mapping
-
Sydney, Australia, Nov.
-
S. B. Eisenman et al. The bikenet mobile sensing system for cyclist experience mapping. In Proc. of Sen- Sys'07, Sydney, Australia, Nov. 2007.
-
(2007)
Proc. of Sen- Sys'07
-
-
Eisenman, S.B.1
-
17
-
-
15744373612
-
Randomization in privacy preserving data mining
-
December
-
A. Evfimievski. Randomization in privacy preserving data mining. ACM SIGKDD Explorations Newsletter, 4(2):43-48, December 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 43-48
-
-
Evfimievski, A.1
-
18
-
-
0000983892
-
Masking procedures for microdata disclosure limitation
-
W. A. Fuller. Masking procedures for microdata disclosure limitation. Official Statistics, 9(2):383-406, 1993.
-
(1993)
Official Statistics
, vol.9
, Issue.2
, pp. 383-406
-
-
Fuller, W.A.1
-
19
-
-
77954992140
-
Greengps: A participatory sensing fuelefficient maps application
-
San Francisco, CA
-
R. K. Ganti, N. Pham, H. Ahmadi, S. Nangia, and T. F. Abdelzaher. Greengps: a participatory sensing fuelefficient maps application. In Proc. of MobiSys'10, pages 151-164, San Francisco, CA, 2010.
-
(2010)
Proc. of MobiSys'10
, pp. 151-164
-
-
Ganti, R.K.1
Pham, N.2
Ahmadi, H.3
Nangia, S.4
Abdelzaher, T.F.5
-
20
-
-
84866489655
-
Poolview: Stream privacy for grassroots participatory sensing
-
R. K. Ganti, N. Pham, Y. Tsai, and T. F. Abdelzaher. Poolview: Stream privacy for grassroots participatory sensing. In Proc. of SenSys'08, pages 281-294, 2008.
-
(2008)
Proc. of SenSys'08
, pp. 281-294
-
-
Ganti, R.K.1
Pham, N.2
Tsai, Y.3
Abdelzaher, T.F.4
-
21
-
-
85162603715
-
Fuel consumption data set
-
GreenGPS Data Set. Fuel consumption data set. http://smart-attire.cs. uiuc.edu/raghukiran/obd/.
-
GreenGPS Data Set
-
-
-
22
-
-
29844458622
-
Deriving private information fromrandomized data
-
Z. Huang,W. Du, and B. Chen. Deriving private information fromrandomized data. In Proc. of SIGMOD'05, pages 37-48, 2005.
-
(2005)
Proc. of SIGMOD'05
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
23
-
-
34247356882
-
CarTel: A distributed mobile sensor computing system
-
DOI 10.1145/1182807.1182821, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
-
B. Hull et al. Cartel: a distributed mobile sensor computing system. In Proc. of SenSys'06, pages 125-138, 2006. (Pubitemid 47168682)
-
(2006)
SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
, pp. 125-138
-
-
Hull, B.1
Bychkovsky, V.2
Zhang, Y.3
Chen, K.4
Goraczko, M.5
Miu, A.6
Shih, E.7
Balakrishnan, H.8
Madden, S.9
-
24
-
-
85024429815
-
A new approach to linear filtering and prediction problems
-
R. E. Kalman. A new approach to linear filtering and prediction problems. Trans. of the ASME-Journal of Basic Eng., 82(Series D):35-45, 1960.
-
(1960)
Trans. of the ASME-Journal of Basic Eng.
, vol.82
, Issue.SERIES D
, pp. 35-45
-
-
Kalman, R.E.1
-
25
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q.Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proc. of ICDM, page 99, 2003.
-
(2003)
Proc. of ICDM
, pp. 99
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
26
-
-
20744460179
-
Secure regression on distributed databases
-
A. F. Karr et al. Secure regression on distributed databases. J. Computational and Graphical Statist, 14:263-279, 2004.
-
(2004)
J. Computational and Graphical Statist
, vol.14
, pp. 263-279
-
-
Karr, A.F.1
-
28
-
-
85162582887
-
-
KNITRO. http://www.ziena.com/knitro.htm.
-
-
-
-
31
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew. A data distortion by probability distribution. ACM Trans. Database Syst., 10(3):395-411, 1985.
-
(1985)
ACM Trans. Database Syst.
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
33
-
-
34248181923
-
L-diversity: Privacy beyond kanonymity
-
A.Machanavajjhala,D. Kifer, J. Gehrke, andM. Venkitasubramaniam. L-diversity: Privacy beyond kanonymity. ACM Trans. Knowl. Discov. Data, 1(1):3, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 3
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
34
-
-
79958737442
-
Privacy-preserving reconstruction of multidimensional datamaps in vehicular participatory sensing
-
Coimbra, Portugal, Feb.
-
N. Pham, R. Ganti, M. Y. Uddin, S. Nath, and T. Abdelzaher. Privacy-preserving reconstruction of multidimensional datamaps in vehicular participatory sensing. In Proc. of EWSN'10, Coimbra, Portugal, Feb. 2010.
-
(2010)
Proc. of EWSN'10
-
-
Pham, N.1
Ganti, R.2
Uddin, M.Y.3
Nath, S.4
Abdelzaher, T.5
-
35
-
-
4544312695
-
Cryptographic techniques for privacypreserving data mining
-
B. Pinkas. Cryptographic techniques for privacypreserving data mining. SIGKDD Explor. Newsl., 4(2):12-19, 2002.
-
(2002)
SIGKDD Explor. Newsl.
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
36
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In Proc. of SIGMOD'10, 2010.
-
(2010)
Proc. of SIGMOD'10
-
-
Rastogi, V.1
Nath, S.2
-
37
-
-
0001223006
-
Computationally related problems
-
S. Sahni. Computationally related problems. SIAM Journal on Computing, 3(4):262-279, 1974.
-
(1974)
SIAM Journal on Computing
, vol.3
, Issue.4
, pp. 262-279
-
-
Sahni, S.1
-
38
-
-
12244286332
-
Privacy preserving regressionmodelling via distributed computation
-
A. P. Sanil, A. F. Karr, X. Lin, and J. P. Reiter. Privacy preserving regressionmodelling via distributed computation. In Proc. of KDD'04, pages 677-682, 2004.
-
(2004)
Proc. of KDD'04
, pp. 677-682
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
39
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Canada
-
J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In Proc. of KDD'02, pages 639-644, Edmonton, Canada, 2002.
-
(2002)
Proc. of KDD'02
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
40
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Stat. Assoc., 60(309):63-69, 1965.
-
(1965)
Journal of the American Stat. Assoc.
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
41
-
-
34250680246
-
Personalized privacy preservation
-
June
-
X. Xiao and Y. Tao. Personalized privacy preservation. In Proc. of SIGMOD'06, pages 229-240, June 2006.
-
(2006)
Proc. of SIGMOD'06
, pp. 229-240
-
-
Xiao, X.1
Tao, Y.2
-
42
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164, 1982.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
|