-
1
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. SIGMOD Record, 29(2): 439-450, 2000.
-
(2000)
SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
36948999941
-
-
University of California, Irvine, School of Information and Computer Sciences
-
A. Asuncion and D.J. Newman. UCI Machine Learning Repository. University of California, Irvine, School of Information and Computer Sciences, 2007. URL http://www. ics.uci.edu/~mlearn/MLRepository.html.
-
(2007)
UCI Machine Learning Repository
-
-
Asuncion, A.1
Newman, D.J.2
-
3
-
-
35348848696
-
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th International World Wide Web Conference, 2007.
-
(2007)
Proceedings of the 16th International World Wide Web Conference
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
4
-
-
0141693771
-
An elementary introduction to modern convex geometry
-
S. Levy, editor, Cambridge University Press
-
K. Ball. An elementary introduction to modern convex geometry. In S. Levy, editor, Flavors of Geometry, volume 31 of Mathematical Sciences Research Institute Publications, pages 1-58. Cambridge University Press, 1997.
-
(1997)
Flavors of Geometry, Volume 31 of Mathematical Sciences Research Institute Publications
, pp. 1-58
-
-
Ball, K.1
-
5
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
DOI 10.1145/1265530.1265569, Proceedings of the Twenty-sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2007
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pages 273-282, 2007. (Pubitemid 47620902)
-
(2007)
Proceedings of the ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
7
-
-
0004302610
-
-
A Wiley-Interscience publication. Wiley, New York [u.a.], 3. ed edition. ISBN 0471007102
-
P Billingsley. Probability and measure. A Wiley-Interscience publication. Wiley, New York [u.a.], 3. ed edition, 1995. ISBN 0471007102.
-
(1995)
Probability and Measure
-
-
Billingsley, P.1
-
8
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
R. E. Ladner and C. Dwork, editors. ACM. ISBN 978-1-60558-047-0
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In R. E. Ladner and C. Dwork, editors, Proceedings of the 40th ACM Symposium on Theory of Computing (STOC), pages 609-618. ACM, 2008. ISBN 978-1-60558-047-0.
-
(2008)
Proceedings of the 40th ACM Symposium on Theory of Computing (STOC)
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
10
-
-
34247849152
-
Training a support vector machine in the primal
-
May
-
O. Chapelle. Training a support vector machine in the primal. Neural Computation, 19(5):1155-1178, May 2007.
-
(2007)
Neural Computation
, vol.19
, Issue.5
, pp. 1155-1178
-
-
Chapelle, O.1
-
11
-
-
33749566820
-
When random sampling preserves privacy
-
Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings
-
K. Chaudhuri and N. Mishra. When random sampling preserves privacy. In Cynthia Dwork, editor, CRYPTO, volume 4117 of Lecture Notes in Computer Science, pages 198-213. Springer, 2006. ISBN 3-540-37432-9. (Pubitemid 44532117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4117
, pp. 198-213
-
-
Chaudhuri, K.1
Mishra, N.2
-
13
-
-
33746335051
-
Differential privacy
-
DOI 10.1007/11787006-1, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
C. Dwork. Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, editors, ICALP (2), volume 4052 of Lecture Notes in Computer Science, pages 1-12. Springer, 2006. ISBN 3-540-35907-9. (Pubitemid 44113232)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
15
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Serge Vaudenay, editor, EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, pages 486-503. Springer, 2006a. (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
16
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In 3rd IACR Theory of Cryptography Conference., pages 265-284, 2006b. (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
19
-
-
77951678087
-
Differentially private approximation algorithms
-
A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar. Differentially private approximation algorithms. In Proceedings of the 2010 ACM-SIAM Symposium on Discrete Algorithms (SODA), 2010.
-
(2010)
Proceedings of The, 2010 ACM-SIAM Symposium on Discrete Algorithms (SODA)
-
-
Gupta, A.1
Ligett, K.2
McSherry, F.3
Roth, A.4
Talwar, K.5
-
20
-
-
84925605946
-
The entire regularization path for the support vector machine
-
T. Hastie, S. Rosset, R. Tibshirani, and J. Zhu. The entire regularization path for the support vector machine. Journal of Machine Learning Research, 5:1391-1415, 2004.
-
(2004)
Journal of Machine Learning Research
, vol.5
, pp. 1391-1415
-
-
Hastie, T.1
Rosset, S.2
Tibshirani, R.3
Zhu, J.4
-
21
-
-
0003704318
-
-
University of California, Irvine, Department of Information and Computer Science
-
S. Hettich and S.D. Bay. The UCI KDD Archive. University of California, Irvine, Department of Information and Computer Science, 1999. URL http://kdd.ics.uci.edu.
-
(1999)
The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.D.2
-
22
-
-
50849101381
-
Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays
-
08
-
N. Homer, S. Szelinger, M. Redman, D. Duggan, W. Tembe, J. Muehling, J. V. Pearson, D. A. Stephan, S. F. Nelson, and D. W. Craig. Resolving individuals contributing trace amounts of dna to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genetics, 4 (8):e1000167, 08 2008.
-
(2008)
PLoS Genetics
, vol.4
, Issue.8
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
23
-
-
63449090629
-
"I know what you did last summer": Query logs and user privacy
-
New York, NY, USA. ACM. ISBN 978-159593-803-9
-
R. Jones, R. Kumar, B. Pang, and A. Tomkins. "i know what you did last summer": query logs and user privacy. In CIKM '07: Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, pages 909-914, New York, NY, USA, 2007. ACM. ISBN 978-159593-803-9.
-
(2007)
CIKM '07: Proceedings of the Sixteenth, ACM Conference on Information and Knowledge Management
, pp. 909-914
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
25
-
-
57949111704
-
What can we learn privately?
-
S. A. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In Proc. of FOCS, 2008.
-
(2008)
Proc. of FOCS
-
-
Kasiviswanathan, S.A.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
26
-
-
0000406385
-
A correspondence between Bayesian estimation on stochastic processes and smoothing by splines
-
G.S. Kimeldorfand G. Wahba. A correspondence between Bayesian estimation on stochastic processes and smoothing by splines. Annals of Mathematical Statistics, 41:495-502, 1970.
-
(1970)
Annals of Mathematical Statistics
, vol.41
, pp. 495-502
-
-
Kimeldorfand, G.S.1
Wahba, G.2
-
29
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In Proceedings of the 24th International Conference on Data Engineering (ICDE), pages 277-286, 2008.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering (ICDE)
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
32
-
-
50249142450
-
Robust de-anonymization of large sparse datasets (how to break anonymity of the netflix prize dataset)
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets (how to break anonymity of the netflix prize dataset). In Proceedings of 29th IEEE Symposium on Security and Privacy, pages 111-125, 2008.
-
(2008)
Proceedings of 29th, IEEE Symposium on Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
33
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
DOI 10.1145/1250790.1250803, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In David S. Johnson and Uriel Feige, editors, Proceedings of the 39th ACM Symposium on the Theory of Computing (STOC), pages 75-84. ACM, 2007. ISBN 978-1-59593-631-8. (Pubitemid 47630723)
-
(2007)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
43
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
L. Sweeney. Weaving technology and policy together to maintain conidentiality. Journal of Law, Medicine and Ethics, 25:98-110, 1997. (Pubitemid 127448006)
-
(1997)
Journal of Law, Medicine and Ethics
, vol.25
, Issue.2-3
, pp. 98-110
-
-
Sweeney, L.1
-
46
-
-
74049130896
-
Learning your identity and disease from research papers: Information leaks in genome wide association study
-
R. Wang, Y. F. Li, X. Wang, H. Tang, and X.-Y Zhou. Learning your identity and disease from research papers: information leaks in genome wide association study. In ACM Conference on Computer and Communications Security, pages 534-544, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 534-544
-
-
Wang, R.1
Li, Y.F.2
Wang, X.3
Tang, H.4
Zhou, X.-Y.5
-
50
-
-
70449464977
-
Differential privacy with compression
-
Seoul, South Korea
-
S. Zhou, K. Ligett, and L. Wasserman. Differential privacy with compression. In Proceedings of the 2009 International Symposium on Information Theory, Seoul, South Korea, 2009.
-
(2009)
Proceedings of The, 2009 International Symposium on Information Theory
-
-
Zhou, S.1
Ligett, K.2
Wasserman, L.3
|