-
4
-
-
28444434728
-
A framework for high-accuracy privacy preserving mining
-
Agrawal, S. and Haritsa, J. A framework for high-accuracy privacy preserving mining. ICDE'05.
-
ICDE'05
-
-
Agrawal, S.1
Haritsa, J.2
-
5
-
-
85038452815
-
Privacy skyline: privacy with multidimensional adversarial knowledge
-
Chen, B.-C., Ramakrishnan, R., and LeFevre, K. Privacy skyline: privacy with multidimensional adversarial knowledge. VLDB'07.
-
VLDB'07
-
-
Chen, B.-C.1
Ramakrishnan, R.2
LeFevre, K.3
-
6
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
Chernoff, H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Annals of Mathematical Statistics, 23, 4 (1952), 493-507.
-
(1952)
Annals of Mathematical Statistics
, vol.23
, Issue.4
, pp. 493-507
-
-
Chernoff, H.1
-
7
-
-
0014612601
-
Reducing the bandwidth of sparse symmetric matrices
-
Cuthill, E. and McKee, J. Reducing the bandwidth of sparse symmetric matrices. In Proc. of Nat. ACM Conf., 1969.
-
(1969)
Proc. of Nat. ACM Conf.
-
-
Cuthill, E.1
McKee, J.2
-
8
-
-
77952334884
-
Using randomized response techniques for privacy preserving data mining
-
Du, W. and Zhan, Z. Using randomized response techniques for privacy preserving data mining. SIGKDD'03.
-
SIGKDD'03
-
-
Du, W.1
Zhan, Z.2
-
9
-
-
85088183001
-
Limiting privacy breaches in privacy preserving data mining
-
Evfimievski, A., Gehrke, J., and Srikant, R. Limiting privacy breaches in privacy preserving data mining. PODS'03.
-
PODS'03
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
10
-
-
84988315609
-
Fast data anonymization with low information loss
-
Ghinita, G., Karras, P., Kalnis, P., and Mamoulis, N. Fast data anonymization with low information loss. VLDB'07.
-
VLDB'07
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
11
-
-
52649106883
-
On the anonymization of sparse high-dimensional data
-
Ghinita, G., Tao, Y., and Kalnis, P. On the anonymization of sparse high-dimensional data. ICDE'08.
-
ICDE'08
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
12
-
-
52649154023
-
OptRR: optimizing randomized response schemes for privacy-preserving data mining
-
Huang, Z. and Du, W. OptRR: optimizing randomized response schemes for privacy-preserving data mining. ICDE'08.
-
ICDE'08
-
-
Huang, Z.1
Du, W.2
-
13
-
-
34548710709
-
Aggregate query answering on anonymized tables
-
Koudas, N., Srivastava, D., Yu, T., and Zhang, Q. Aggregate query answering on anonymized tables. ICDE'07.
-
ICDE'07
-
-
Koudas, N.1
Srivastava, D.2
Yu, T.3
Zhang, Q.4
-
14
-
-
85038473183
-
Modeling and integrating background knowledge
-
Li, T. and Li, N. Modeling and integrating background knowledge. ICDE'09.
-
ICDE'09
-
-
Li, T.1
Li, N.2
-
15
-
-
33749607006
-
l-diversity: privacy beyond kanonymity
-
Machanavajjhala, A., Gehrke, J., Kifer, D., and Venkitasubramaniam, M. l-diversity: privacy beyond kanonymity. ICDE'06.
-
ICDE'06
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
16
-
-
70849116921
-
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
-
McSherry, F. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. SIGMOD'09.
-
SIGMOD'09
-
-
McSherry, F.1
-
17
-
-
85011019712
-
The boundary between privacy and utility in data publishing
-
Rastogi, V., Hong, S., and Suciu, D. The boundary between privacy and utility in data publishing. VLDB'07.
-
VLDB'07
-
-
Rastogi, V.1
Hong, S.2
Suciu, D.3
-
18
-
-
34547191587
-
Reducing the total bandwidth of a sparse unsymmetric matrix
-
Reid, J. K. and Scott, J. A. Reducing the total bandwidth of a sparse unsymmetric matrix. SIAM J. Matrix Anal. Appl., 28, 3 (2006), 805-821.
-
(2006)
SIAM J. Matrix Anal. Appl.
, vol.28
, Issue.3
, pp. 805-821
-
-
Reid, J.K.1
Scott, J.A.2
-
19
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P. Protecting respondents' identities in microdata release. TKDE, 13, 6 (2001), 1010-1027.
-
(2001)
TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
20
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney, L. Achieving k-anonymity privacy protection using generalization and suppression. Int'l J. on Uncert., Fuzz. and Knowledge-based Sys., 10, 5 (2002), 571-588.
-
(2002)
Int'l J. on Uncert., Fuzz. and Knowledge-based Sys.
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
21
-
-
52649134322
-
On anti-corruption privacy preserving publication
-
Tao, Y., Xiao, X., Li, J., and Zhang, D. On anti-corruption privacy preserving publication. ICDE'08.
-
ICDE'08
-
-
Tao, Y.1
Xiao, X.2
Li, J.3
Zhang, D.4
-
22
-
-
0013776710
-
Randomized response: a survey technique for eliminating evasive answer bias
-
Warner, S. L. Randomized response: a survey technique for eliminating evasive answer bias. The A. Stat. Assoc., 60, 309 (1965), 63-69.
-
(1965)
The A. Stat. Assoc.
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
23
-
-
85146197223
-
Anatomy: simple and effective privacy preservation
-
Xiao, X. and Tao, Y. Anatomy: simple and effective privacy preservation. VLDB'06.
-
VLDB'06
-
-
Xiao, X.1
Tao, Y.2
-
24
-
-
77956224773
-
Optimal random perturbation at multiple privacy levels
-
Xiao, X., Tao, Y., and Chen, M. Optimal random perturbation at multiple privacy levels. VLDB'09.
-
VLDB'09
-
-
Xiao, X.1
Tao, Y.2
Chen, M.3
|