-
2
-
-
35448955720
-
Privacy, accuracy, and consistency too: A holistic solution to contingency table release
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In ACM Principles of Database Systems, 2007.
-
(2007)
ACM Principles of Database Systems
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
3
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
J. Brickell and V. Shmatikov. The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In ACM SIGKDD, 2008.
-
(2008)
ACM SIGKDD
-
-
Brickell, J.1
Shmatikov, V.2
-
5
-
-
0012793677
-
Towards a methodology for statistical disclosure control
-
T. Dalenius. Towards a methodology for statistical disclosure control. Statistik Tidskrift, 15:429-444, 1977.
-
(1977)
Statistik Tidskrift
, vol.15
, pp. 429-444
-
-
Dalenius, T.1
-
8
-
-
77956195013
-
Data mining with differential privacy
-
A. Friedman and A. Schuster. Data mining with differential privacy. In ACM SIGKDD, 2010.
-
(2010)
ACM SIGKDD
-
-
Friedman, A.1
Schuster, A.2
-
9
-
-
65449162734
-
Omposition attacks and auxiliary information in data privacy
-
C
-
S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In ACM SIGKDD, 2008.
-
(2008)
ACM SIGKDD
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
11
-
-
38749142809
-
Revisiting the uniqueness of simple demographics in the us population
-
P. Golle. Revisiting the uniqueness of simple demographics in the us population. In Workshop On Privacy In The Electronic Society, 2006.
-
(2006)
Workshop on Privacy in the Electronic Society
-
-
Golle, P.1
-
12
-
-
57949111704
-
What can we learn privately?
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In IEEE Conference on Foundations of Computer Science, 2008.
-
(2008)
IEEE Conference on Foundations of Computer Science
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
18
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the netflix prize contenders. In ACM SIGKDD, 2009.
-
(2009)
ACM SIGKDD
-
-
McSherry, F.1
Mironov, I.2
-
19
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04, SRI, 1998.
-
(1998)
Technical Report SRI-CSL-98-04, SRI
-
-
Samarati, P.1
Sweeney, L.2
-
21
-
-
85011016303
-
Minimality attack in privacy preserving data publishing
-
R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In International Conference on Very Large Data Bases, pages 543-554, 2007.
-
(2007)
International Conference on Very Large Data Bases
, pp. 543-554
-
-
Wong, R.C.-W.1
Fu, A.W.-C.2
Wang, K.3
Pei, J.4
|