-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: Proceedingsof ACM PODS, pp. 153-162 (2006)
-
(2006)
Proceedingsof ACM PODS
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
33746711412
-
Approximation algorithms fork-anonymity
-
(Paper number: 20051120001)
-
Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms fork-anonymity. J. Priv. Tech. (Paper number: 20051120001) (2005)
-
(2005)
J. Priv. Tech
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
4
-
-
45749101998
-
Anonymitypreserving pattern discovery
-
(accepted for publication)
-
Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymitypreserving pattern discovery. VLDB J. (accepted for publication) (2008)
-
(2008)
VLDB J
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
5
-
-
28444449426
-
Data privacy through optimalk-anonymization
-
Bayardo, R.J., Agrawal, R.: Data privacy through optimalk-anonymization. In: Proceedings of ICDE, pp 217-228 (2005)
-
(2005)
Proceedings of ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
7
-
-
84988315609
-
-
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymizationwith low information loss. In: vldb, pp. 758-769 (2007)
-
(2007)
Fast Data Anonymizationwith Low Information Loss
, pp. 758-769
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
10
-
-
0033311838
-
Mining multiple-level association rules in largedatabases
-
Han, J., Fu, Y.: Mining multiple-level association rules in largedatabases. IEEE TKDE 11(5), 798-805 (1999)
-
(1999)
IEEE TKDE
, vol.11
, Issue.5
, pp. 798-805
-
-
Han, J.1
Fu, Y.2
-
11
-
-
0039253846
-
Mining frequent patterns without candidategeneration
-
Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidategeneration. In: Proceedings of ACM SIGMOD, pp. 1-12 (2000)
-
(2000)
Proceedings of ACM SIGMOD
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
12
-
-
78049372159
-
Anonymization of set-valued data via topdown,local generalization
-
He, Y., Naughton, J.F.: Anonymization of set-valued data via topdown,local generalization. PVLDB 2(1), 934-945 (2009)
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
13
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar, V.S.: Transforming data to satisfy privacy constraints.In: Proceedings of SIGKDD, pp. 279-288 (2002)
-
(2002)
Proceedings of SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
14
-
-
29844444250
-
Incognito: Efficientfull-domain k-anonymity
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficientfull-domain k-anonymity. In: Proceedings ofACMSIGMOD, pp. 49-60 (2005)
-
(2005)
Proceedings OfACMSIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
16
-
-
34548805858
-
t-Closeness: Privacy beyondk-anonymity and l-diversity
-
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyondk-anonymity and l-diversity. In: Proceedings of ICDE, pp. 106-115 (2007)
-
(2007)
Proceedings of ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
17
-
-
33749607006
-
l-Diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: privacy beyond k-anonymity. In: Proceedings ofICDE (2006)
-
(2006)
Proceedings OfICDE
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
20
-
-
34548804367
-
Multirelational k-anonymity
-
Nergiz, M., Clifton, C., Nergiz, A.: Multirelational k-anonymity.In: Proceedings of ICDE, pp. 1417-1421 (2007)
-
(2007)
Proceedings of ICDE
, pp. 1417-1421
-
-
Nergiz, M.1
Clifton, C.2
Nergiz, A.3
-
21
-
-
34548689125
-
Thoughts on k-anonymization
-
Nergiz, M.E., Clifton, C.: Thoughts on k-anonymization. Data.Knowl. Eng. 63(3), 622-645 (2007)
-
(2007)
Data.Knowl. Eng
, vol.63
, Issue.3
, pp. 622-645
-
-
Nergiz, M.E.1
Clifton, C.2
-
22
-
-
35448962139
-
Approximate algorithms for k-anonymity
-
Park, H., Shim, K.: Approximate algorithms for k-anonymity.In: Proceedings of ACM SIGMOD, pp. 67-78 (2007)
-
(2007)
Proceedings of ACM SIGMOD
, pp. 67-78
-
-
Park, H.1
Shim, K.2
-
23
-
-
0004161838
-
-
2nd edn. Cambridge University Press,Cambridge
-
Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical recipes in C, 2nd edn. Cambridge University Press,Cambridge (1992)
-
(1992)
Numerical Recipes In C
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
24
-
-
0035517699
-
Protecting respondents' identities in microdatarelease
-
Samarati, P.: Protecting respondents' identities in microdatarelease. IEEE TKDE 13(6), 1010-1027 (2001)
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
26
-
-
84859177489
-
Privacy-preserving anonymizationof set-valued data
-
Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymizationof set-valued data. In: Proceedings of theVLDB Endowment(PVLDB) (former VLDB proceedings) 1(1) (2008)
-
(2008)
Proceedings of TheVLDB Endowment(PVLDB) (former VLDB Proceedings)
, vol.1
, Issue.1
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
27
-
-
2142754478
-
Association rule hiding
-
Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association rule hiding. IEEE TKDE 16(4), 434-447 (2004)
-
(2004)
IEEE TKDE
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
28
-
-
84893853914
-
Anatomy: Simple and effective privacy preservation
-
Xiao, X., Tao, Y.: Anatomy: simple and effective privacy preservation.In: Proceedings of VLDB, pp. 139-150 (2006)
-
(2006)
Proceedings of VLDB
, pp. 139-150
-
-
Xiao, X.1
Tao, Y.2
-
29
-
-
33749582207
-
Utility-basedanonymization using local recoding
-
Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-basedanonymization using local recoding. In: Proceedings of SIGKDD, pp. 785-790 (2006)
-
(2006)
Proceedings of SIGKDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Fu, A.6
-
30
-
-
65449148368
-
Anonymizing transactiondatabases for publication
-
Xu, Y., Wang, K., Fu, A.W.-C., Yu, P.S.: Anonymizing transactiondatabases for publication. In: Proceedings of KDD, pp. 767-775 (2008)
-
(2008)
Proceedings of KDD
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.W.-C.3
Yu, P.S.4
-
31
-
-
34548710709
-
Aggregate queryanswering on anonymized tables
-
Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate queryanswering on anonymized tables. In: Proceedings of ICDE, pp. 116-125 (2007)
-
(2007)
Proceedings of ICDE
, pp. 116-125
-
-
Zhang, Q.1
Koudas, N.2
Srivastava, D.3
Yu, T.4
-
32
-
-
0035788918
-
Real world performance ofassociation rule algorithms
-
Zheng, Z., Kohavi, R., Mason, L.: Real world performance ofassociation rule algorithms. In: Proceedings of KDD, pp. 401-406 (2001)
-
(2001)
Proceedings of KDD
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|