메뉴 건너뛰기




Volumn 3, Issue 1, 2010, Pages 608-618

Small domain randomization: Same privacy, more utility

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; PROBABILITY; RANDOM PROCESSES;

EID: 84859221764     PISSN: None     EISSN: 21508097     Source Type: Conference Proceeding    
DOI: 10.14778/1920841.1920919     Document Type: Article
Times cited : (24)

References (24)
  • 4
    • 28444434728 scopus 로고    scopus 로고
    • A framework for high-accuracy privacy preserving mining
    • Agrawal, S. and Haritsa, J. A framework for high-accuracy privacy preserving mining. ICDE'05.
    • ICDE'05
    • Agrawal, S.1    Haritsa, J.2
  • 5
    • 85038452815 scopus 로고    scopus 로고
    • Privacy skyline: privacy with multidimensional adversarial knowledge
    • Chen, B.-C., Ramakrishnan, R., and LeFevre, K. Privacy skyline: privacy with multidimensional adversarial knowledge. VLDB'07.
    • VLDB'07
    • Chen, B.-C.1    Ramakrishnan, R.2    LeFevre, K.3
  • 6
    • 0000182415 scopus 로고
    • A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • Chernoff, H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Annals of Mathematical Statistics, 23, 4 (1952), 493-507.
    • (1952) Annals of Mathematical Statistics , vol.23 , Issue.4 , pp. 493-507
    • Chernoff, H.1
  • 7
    • 0014612601 scopus 로고
    • Reducing the bandwidth of sparse symmetric matrices
    • Cuthill, E. and McKee, J. Reducing the bandwidth of sparse symmetric matrices. In Proc. of Nat. ACM Conf., 1969.
    • (1969) Proc. of Nat. ACM Conf.
    • Cuthill, E.1    McKee, J.2
  • 8
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy preserving data mining
    • Du, W. and Zhan, Z. Using randomized response techniques for privacy preserving data mining. SIGKDD'03.
    • SIGKDD'03
    • Du, W.1    Zhan, Z.2
  • 9
    • 85088183001 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • Evfimievski, A., Gehrke, J., and Srikant, R. Limiting privacy breaches in privacy preserving data mining. PODS'03.
    • PODS'03
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 11
    • 52649106883 scopus 로고    scopus 로고
    • On the anonymization of sparse high-dimensional data
    • Ghinita, G., Tao, Y., and Kalnis, P. On the anonymization of sparse high-dimensional data. ICDE'08.
    • ICDE'08
    • Ghinita, G.1    Tao, Y.2    Kalnis, P.3
  • 12
    • 52649154023 scopus 로고    scopus 로고
    • OptRR: optimizing randomized response schemes for privacy-preserving data mining
    • Huang, Z. and Du, W. OptRR: optimizing randomized response schemes for privacy-preserving data mining. ICDE'08.
    • ICDE'08
    • Huang, Z.1    Du, W.2
  • 14
    • 85038473183 scopus 로고    scopus 로고
    • Modeling and integrating background knowledge
    • Li, T. and Li, N. Modeling and integrating background knowledge. ICDE'09.
    • ICDE'09
    • Li, T.1    Li, N.2
  • 16
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: an extensible platform for privacy-preserving data analysis
    • McSherry, F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. SIGMOD'09.
    • SIGMOD'09
    • McSherry, F.1
  • 17
    • 85011019712 scopus 로고    scopus 로고
    • The boundary between privacy and utility in data publishing
    • Rastogi, V., Hong, S., and Suciu, D. The boundary between privacy and utility in data publishing. VLDB'07.
    • VLDB'07
    • Rastogi, V.1    Hong, S.2    Suciu, D.3
  • 18
    • 34547191587 scopus 로고    scopus 로고
    • Reducing the total bandwidth of a sparse unsymmetric matrix
    • Reid, J. K. and Scott, J. A. Reducing the total bandwidth of a sparse unsymmetric matrix. SIAM J. Matrix Anal. Appl., 28, 3 (2006), 805-821.
    • (2006) SIAM J. Matrix Anal. Appl. , vol.28 , Issue.3 , pp. 805-821
    • Reid, J.K.1    Scott, J.A.2
  • 19
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Samarati, P. Protecting respondents' identities in microdata release. TKDE, 13, 6 (2001), 1010-1027.
    • (2001) TKDE , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 20
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncert., Fuzz. and Knowledge-based Sys., 10, 5 (2002), 571-588.
    • (2002) Int'l J. on Uncert., Fuzz. and Knowledge-based Sys. , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 21
    • 52649134322 scopus 로고    scopus 로고
    • On anti-corruption privacy preserving publication
    • Tao, Y., Xiao, X., Li, J., and Zhang, D. On anti-corruption privacy preserving publication. ICDE'08.
    • ICDE'08
    • Tao, Y.1    Xiao, X.2    Li, J.3    Zhang, D.4
  • 22
    • 0013776710 scopus 로고
    • Randomized response: a survey technique for eliminating evasive answer bias
    • Warner, S. L. Randomized response: a survey technique for eliminating evasive answer bias. The A. Stat. Assoc., 60, 309 (1965), 63-69.
    • (1965) The A. Stat. Assoc. , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 23
    • 85146197223 scopus 로고    scopus 로고
    • Anatomy: simple and effective privacy preservation
    • Xiao, X. and Tao, Y. Anatomy: simple and effective privacy preservation. VLDB'06.
    • VLDB'06
    • Xiao, X.1    Tao, Y.2
  • 24
    • 77956224773 scopus 로고    scopus 로고
    • Optimal random perturbation at multiple privacy levels
    • Xiao, X., Tao, Y., and Chen, M. Optimal random perturbation at multiple privacy levels. VLDB'09.
    • VLDB'09
    • Xiao, X.1    Tao, Y.2    Chen, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.