-
1
-
-
57349112634
-
User 4XXXXX9: Anonymizing query logs
-
Query Log Analysis Workshop
-
E. Adar. User 4XXXXX9: Anonymizing query logs. Query Log Analysis Workshop, In WWW, 2007.
-
(2007)
WWW
-
-
Adar, E.1
-
2
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu. Achieving anonymity via clustering. In PODS, 2006.
-
(2006)
PODS
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
3
-
-
79956041471
-
ρ-uncertainty: Inference-proof transaction anonymization
-
J. Cao, P. Karras, C. Raissi, K. Tan. ρ-uncertainty: Inference-proof transaction anonymization. In VLDB, 2010.
-
(2010)
VLDB
-
-
Cao, J.1
Karras, P.2
Raissi, C.3
Tan, K.4
-
4
-
-
55149118992
-
A survey of query log privacy-enhancing techniques from a policy perspective
-
A. Cooper. A survey of query log privacy-enhancing techniques from a policy perspective. ACM Trans. on the Web, Vol. 2, Issue 4 (2008).
-
(2008)
ACM Trans. on the Web
, vol.2
, Issue.4
-
-
Cooper, A.1
-
6
-
-
52649106883
-
On the anonymization of sparse high-dimensional data
-
G. Ghinita, Y. Tao, and P. Kalnis. On the anonymization of sparse high-dimensional data. In ICDE, 2008.
-
(2008)
ICDE
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
7
-
-
78149328321
-
Mining top-k frequent closed patterns without minimum support
-
J. Han, J. Wang, Y. Lu, P. Tzvetkov. Mining top-k frequent closed patterns without minimum support. In ICDM, 2002.
-
(2002)
ICDM
-
-
Han, J.1
Wang, J.2
Lu, Y.3
Tzvetkov, P.4
-
8
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He and J. Naughton. Anonymization of set-valued data via top-down, local generalization. In VLDB, 2009.
-
(2009)
VLDB
-
-
He, Y.1
Naughton, J.2
-
9
-
-
74549172518
-
Effective anonymization of query logs
-
Y Hong, X. He, J. Vaidya, N. Adam, and V. Atluri. Effective anonymization of query logs. In CIKM, 2009.
-
(2009)
CIKM
-
-
Hong, Y.1
He, X.2
Vaidya, J.3
Adam, N.4
Atluri, V.5
-
10
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
V. Iyengar. Transforming data to satisfy privacy constraints. In KDD, pages 279-288, 2002.
-
(2002)
KDD
, pp. 279-288
-
-
Iyengar, V.1
-
11
-
-
79951760983
-
I know what you did last summer
-
R. Jones, R. Kumar, B. Pang, A. Tomkins. I know what you did last summer. In Query Logs User Privacy, CIKM, 2007.
-
(2007)
Query Logs User Privacy, CIKM
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
13
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
R. Kumar, J. Novak, B. Pang, A. Tomkins. On anonymizing query logs via token-based hashing. In WWW, 2007.
-
(2007)
WWW
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
15
-
-
79951736070
-
Anonymizing transaction data by integrating suppression and generalization
-
J. Liu, K. Wang. Anonymizing transaction data by integrating suppression and generalization. In PAKDD, 2010.
-
(2010)
PAKDD
-
-
Liu, J.1
Wang, K.2
-
17
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information. In PODS, 1998.
-
(1998)
PODS
-
-
Samarati, P.1
Sweeney, L.2
-
18
-
-
84859177489
-
Privacy preserving anonymization of set valued data
-
M. Terrovitis, N. Mamoulis, P. Kalnis. Privacy preserving anonymization of set valued data. In VLDB, 2008.
-
(2008)
VLDB
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
20
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A. Fu, and PS. Yu. Anonymizing transaction databases for publication. In KDD, 2008.
-
(2008)
KDD
-
-
Xu, Y.1
Wang, K.2
Fu, A.3
Yu, P.S.4
-
21
-
-
77954599328
-
Anonymizing user profiles for personalized web search
-
Y Zhu, L. Xiong, C. Verdery. Anonymizing user profiles for personalized web search. In WWW, 2010.
-
(2010)
WWW
-
-
Zhu, Y.1
Xiong, L.2
Verdery, C.3
|