-
1
-
-
33749319132
-
Mix, match, and mutate
-
July
-
R.D. Hof, "Mix, Match, and Mutate," Business Week, July 2005.
-
(2005)
Business Week
-
-
Hof, R.D.1
-
2
-
-
0005685575
-
C4.5: Programs for machine learning
-
J.R. Quinlan, C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993.
-
(1993)
Morgan Kaufmann
-
-
Quinlan, J.R.1
-
3
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
4
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
DOI 10.1142/S021848850200165X
-
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 10, no. 5, pp. 571-588, 2002. (Pubitemid 35384858)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
5
-
-
34248181923
-
Diversity: Privacy Beyond k-Anonymity
-
Mar
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, Diversity: Privacy Beyond k-Anonymity," ACM Trans. Knowledge Discovery from Data, vol. 1, no. 1, Mar. 2007.
-
(2007)
ACM Trans. Knowledge Discovery from Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
6
-
-
34147125465
-
Handicapping attacker's confidence: An alternative to k-Anonymization
-
Apr
-
K. Wang, B.C.M. Fung, and P.S. Yu, "Handicapping Attacker's Confidence: An Alternative to k-Anonymization," Knowledge and Information Systems, vol. 11, no. 3, pp. 345-368, Apr. 2007.
-
(2007)
Knowledge and Information Systems
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
8
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
DOI 10.1109/TKDE.2007.1015
-
B.C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data for Privacy Preservation," IEEE Trans. Knowledge and Data Eng., vol. 19, no. 5, pp. 711-725, May 2007. (Pubitemid 46509408)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
12
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
June
-
B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu, "Privacy-Preserving Data Publishing: A Survey of Recent Developments," ACM Computing Surveys, vol. 42, no. 4, pp. 14:1-14:53, June 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 141-1453
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
13
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
June
-
N. Mohammed, B.C.M. Fung, P.C.K. Hung, and C. Lee, "Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service," Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 1285-1294, June 2009.
-
(2009)
Proc. 15th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.4
-
14
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
Oct.
-
N. Mohammed, B.C.M. Fung, P.C.K. Hung, and C.K. Lee, "Centralized and Distributed Anonymization for High-Dimensional Healthcare Data," ACM Trans. Knowledge Discovery from Data, vol. 4, no. 4, pp. 18:1-18:33, Oct. 2010.
-
(2010)
ACM Trans. Knowledge Discovery from Data
, vol.4
, Issue.4
, pp. 181-1833
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.K.4
-
15
-
-
84893871762
-
Enterprise information mashups: Integrating information, simply
-
A. Jhingran, "Enterprise Information Mashups: Integrating Information, Simply," Proc. 32nd Int'l Conf. Very Large Data Bases, pp. 3-4, 2006.
-
(2006)
Proc. 32nd Int'l Conf. Very Large Data Bases
, pp. 3-4
-
-
Jhingran, A.1
-
19
-
-
78049357399
-
Secure multiparty computation for privacy-preserving data mining
-
Y. Lindell and B. Pinkas, "Secure Multiparty Computation for Privacy-Preserving Data Mining," J. Privacy and Confidentiality, vol. 1, no. 1, pp. 59-98, 2009.
-
(2009)
J. Privacy and Confidentiality
, vol.1
, Issue.1
, pp. 59-98
-
-
Lindell, Y.1
Pinkas, B.2
-
21
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Dec
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.Y. Zhu, "Tools for Privacy Preserving Distributed Data Mining," ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 28-34, Dec. 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
23
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Z. Yang, S. Zhong, and R.N. Wright, "Privacy-Preserving Classification of Customer Data without Loss of Accuracy," Proc. Fifth SIAM Int'l Conf. Data Mining, pp. 92-102, 2005.
-
(2005)
Proc. Fifth SIAM Int'l Conf. Data Mining
, pp. 92-102
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
27
-
-
36048997303
-
A secure distributed framework for achieving k-Anonymity
-
Nov
-
W. Jiang and C. Clifton, "A Secure Distributed Framework for Achieving k-Anonymity," J. Very Large Data Bases, vol. 15, no. 4, pp. 316-333, Nov. 2006.
-
(2006)
J. Very Large Data Bases
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
28
-
-
70349096680
-
Privacy-preserving data mashup
-
Mar.
-
N. Mohammed, B.C.M. Fung, K. Wang, and P.C.K. Hung, "Privacy- Preserving Data Mashup," Proc. 12th Int'l Conf. Extending Database Technology (EDBT), pp. 228-239, Mar. 2009.
-
(2009)
Proc. 12th Int'l Conf. Extending Database Technology (EDBT)
, pp. 228-239
-
-
Mohammed, N.1
Fung, B.C.M.2
Wang, K.3
Hung, P.C.K.4
-
29
-
-
79960442271
-
Anonymity meets game theory: Secure data integration with malicious participants
-
N. Mohammed, B.C.M. Fung, and M. Debbabi, "Anonymity Meets Game Theory: Secure Data Integration with Malicious Participants," Int'l J. Very Large Data Bases, vol. 20, pp. 567-588, 2011.
-
Int'l J. Very Large Data Bases
, vol.20
, Issue.2011
, pp. 567-588
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
30
-
-
70449509546
-
Service-oriented architecture for privacy-preserving data mashup
-
July
-
T. Trojer, B.C.M. Fung, and P.C.K. Hung, "Service-Oriented Architecture for Privacy-Preserving Data Mashup," Proc. IEEE Seventh Int'l Conf. Web Services, pp. 767-774, July 2009.
-
(2009)
Proc. IEEE Seventh Int'l Conf. Web Services
, pp. 767-774
-
-
Trojer, T.1
Fung, B.C.M.2
Hung, P.C.K.3
-
33
-
-
35348905576
-
Subspace: Secure cross-domain communication for web mashups
-
DOI 10.1145/1242572.1242655, 16th International World Wide Web Conference, WWW2007
-
C. Jackson and H.J. Wang, "Subspace: Secure Cross-Domain Communication for Web Mashups," Proc. 16th Int'l Conf. World Wide Web, pp. 611-620, 2007. (Pubitemid 47582290)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 611-620
-
-
Jackson, C.1
Wang, H.J.2
-
34
-
-
33749571958
-
(α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
R.C.W. Wong, J. Li, A.W.C. Fu, and K. Wang, " k-Anonymity: An Enhanced k-Anonymity Model for Privacy Preserving Data Publishing," Proc. 12th ACM Int'l Conf. Knowledge Discovery and Data Mining (SIGKDD), pp. 754-759, 2006. (Pubitemid 44535586)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 754-759
-
-
Wong, R.C.-W.1
Li, J.2
Fu, A.W.-C.3
Wang, K.4
-
35
-
-
84856043672
-
A mathematical theory of communication
-
p. 379
-
C.E. Shannon, "A Mathematical Theory of Communication," The Bell System Technical J., vol. 27, p. 379, p. 623, 1948.
-
(1948)
The Bell System Technical J.
, vol.27
, pp. 623
-
-
Shannon, C.E.1
-
38
-
-
38049134850
-
Multi-party, privacy-preserving distributed data mining using a game theoretic framework
-
H. Kargupta, K. Das, and K. Liu, "Multi-Party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework," Proc. 11th European Conf. Principles and Practice of Knowledge Discovery in Databases (PKDD), pp. 523-531, 2007.
-
(2007)
Proc. 11th European Conf. Principles and Practice of Knowledge Discovery in Databases (PKDD)
, pp. 523-531
-
-
Kargupta, H.1
Das, K.2
Liu, K.3
-
41
-
-
33745834241
-
-
D.J. Newman, S. Hettich, C.L. Blake, and C.J. Merz, "UCI Repository of Machine Learning Databases," http://archive. ics.uci.edu/ml, 1998.
-
(1998)
Uci Repository of Machine Learning Databases
-
-
Newman, D.J.1
Hettich, S.2
Blake, C.L.3
Merz, C.J.4
-
42
-
-
0003483188
-
Protecting privacy when disclosing information: K-Anonymity and its enforcement through generalization and suppression
-
Mar.
-
P. Samarati and L. Sweeney, "Protecting Privacy When Disclosing Information: k-Anonymity and Its Enforcement through Generalization and Suppression," Technical Report, SRI Int'l, Mar. 1998.
-
(1998)
Technical Report, SRI Int'l
-
-
Samarati, P.1
Sweeney, L.2
|