-
1
-
-
34250661905
-
Achieving Anonymity Via Clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, 2006.
-
(2006)
PODS
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, T. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu. Approximation algorithms for k-anonymity. J. of Privacy Tech., 2005.
-
(2005)
J. of Privacy Tech
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
28444449426
-
Data Privacy Through Optimal K-anonymization
-
R. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, 2005.
-
(2005)
ICDE
-
-
Bayardo, R.1
Agrawal, R.2
-
5
-
-
38049041399
-
Efficient k-anonymization using clustering techniques
-
J.W. Byun, A. Kamra, E. Bertino, and N. Li. Efficient k-anonymization using clustering techniques. In DASFAA, 2007.
-
(2007)
DASFAA
-
-
Byun, J.W.1
Kamra, A.2
Bertino, E.3
Li, N.4
-
7
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
J. Domingo-Ferrer and V. Torra. A critique of k-anonymity and some of its enhancements. In ARES, 2008.
-
(2008)
ARES
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
8
-
-
68649129111
-
A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans
-
G. Ghinita, P. Karras, P. Kalnis, and N. Mamoulis. A framework for efficient data anonymization under privacy and accuracy constraints. ACM Trans. Database Syst., 34, 2009.
-
(2009)
Database Syst
, pp. 34
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
10
-
-
69549119179
-
k-Anonymization with minimal loss of information
-
A. Gionis and T. Tassa. k-Anonymization with minimal loss of information. IEEE Trans. Knowl. Data Eng., 21, 2009.
-
(2009)
IEEE Trans. Knowl. Data Eng
, pp. 21
-
-
Gionis, A.1
Tassa, T.2
-
11
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In SIGKDD, 2002.
-
(2002)
SIGKDD
-
-
Iyengar, V.1
-
13
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke. Injecting utility into anonymized datasets. In ICDM, 2006.
-
(2006)
ICDM
-
-
Kifer, D.1
Gehrke, J.2
-
18
-
-
3142691086
-
On the complexity of optimal k-anonymity
-
A. Meyerson and R. Williams. On the complexity of optimal k-anonymity. In PODS, 2004.
-
(2004)
PODS
-
-
Meyerson, A.1
Williams, R.2
-
19
-
-
0035049112
-
Analysis of the clustering properties of the Hilbert space-filling curve
-
B. Moon, H. Jagadish, and C. Faloutsos. Analysis of the clustering properties of the Hilbert space-filling curve. The New England Journal of Medicine, 13(1):124-141, 2001.
-
(2001)
The New England Journal of Medicine
, vol.13
, Issue.1
, pp. 124-141
-
-
Moon, B.1
Jagadish, H.2
Faloutsos, C.3
-
21
-
-
35448962139
-
Approximate algorithms for k-anonymity
-
H. Park and K. Shim. Approximate algorithms for k-anonymity. In SIGMOD, 2007.
-
(2007)
SIGMOD
-
-
Park, H.1
Shim, K.2
-
22
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information (abstract)
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In PODS, 1998.
-
(1998)
PODS
-
-
Samarati, P.1
Sweeney, L.2
-
23
-
-
0036993190
-
Unsupervised document classification using sequential information maximization
-
N. Slonim, N. Friedman, and N. Tishby. Unsupervised document classification using sequential information maximization. In ACM SIGIR, 2002.
-
(2002)
ACM SIGIR
-
-
Slonim, N.1
Friedman, N.2
Tishby, N.3
-
25
-
-
33749571958
-
(α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing
-
R.C.W. Wong, J. Li, A.W.C. Fu, and K. Wang. (α, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In KDD, pages 754-759, 2006.
-
(2006)
In KDD
, pp. 754-759
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
|