-
1
-
-
84873118092
-
-
AOL search log dataset
-
AOL search log dataset. http://www.gregsadetsky.com/aol-data/.
-
-
-
-
2
-
-
85039661885
-
-
Frequent itemset mining dataset repository
-
Frequent itemset mining dataset repository. http://fimi.ua.ac.be/data/.
-
-
-
-
3
-
-
35348877424
-
Why we search: visualizing and predicting user behavior
-
E. Adar, D. S. Weld, B. N. Bershad, and S. D. Gribble. Why we search: visualizing and predicting user behavior. In WWW, pages 161-170, 2007.
-
(2007)
WWW
, pp. 161-170
-
-
Adar, E.1
Weld, D.S.2
Bershad, B.N.3
Gribble, S.D.4
-
4
-
-
33745629638
-
On k-anonymity and the curse of dimensionality
-
C. C. Aggarwal. On k-anonymity and the curse of dimensionality. In VLDB, pages 901-909, 2005.
-
(2005)
VLDB
, pp. 901-909
-
-
Aggarwal, C.C.1
-
5
-
-
0002221136
-
Fast algorithms for mining association rules in large databases
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB, pages 487-499, 1994.
-
(1994)
VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
45749101998
-
Anonymity preserving pattern discovery
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Anonymity preserving pattern discovery. VLDB Journal, 17(4):703-727, 2008.
-
(2008)
VLDB Journal
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
7
-
-
35448955720
-
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
-
B. Barak, K. Chaudhuri, C. Dwork, S. Kale, F. McSherry, and K. Talwar. Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In PODS, pages 273-282, 2007.
-
(2007)
PODS
, pp. 273-282
-
-
Barak, B.1
Chaudhuri, K.2
Dwork, C.3
Kale, S.4
McSherry, F.5
Talwar, K.6
-
8
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering frequent patterns in sensitive data. In KDD, pages 503-512, 2010.
-
(2010)
KDD
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
9
-
-
33244468835
-
Practical privacy: the sulq framework
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the sulq framework. In PODS, pages 128-138, 2005.
-
(2005)
PODS
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
10
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
11
-
-
0031161999
-
Beyond market baskets: Generalizing association rules to correlations
-
S. Brin, R. Motwani, and C. Silverstein. Beyond market baskets: Generalizing association rules to correlations. In SIGMOD, pages 265-276, 1997.
-
(1997)
SIGMOD
, pp. 265-276
-
-
Brin, S.1
Motwani, R.2
Silverstein, C.3
-
12
-
-
84976668743
-
Finding all cliques of an undirected graph (algorithm 457)
-
C. Bron and J. Kerbosch. Finding all cliques of an undirected graph (algorithm 457). Commun. ACM, 16(9):575-576, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.9
, pp. 575-576
-
-
Bron, C.1
Kerbosch, J.2
-
13
-
-
79956041471
-
Rho-uncertainty: Inference-proof transaction anonymization
-
J. Cao, P. Karras, C. Raïssi, and K.-L. Tan. Rho-uncertainty: Inference-proof transaction anonymization. PVLDB, 3(1):1033-1044, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1033-1044
-
-
Cao, J.1
Karras, P.2
Raïssi, C.3
Tan, K.-L.4
-
14
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11):1087-1098, 2011.
-
(2011)
PVLDB
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
15
-
-
1142275486
-
Revealing information while preserving privacy
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
16
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, pages 1-12, 2006.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
17
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
18
-
-
35048856104
-
Privacy-preserving datamining on vertically partitioned databases
-
C. Dwork and K. Nissim. Privacy-preserving datamining on vertically partitioned databases. In CRYPTO, pages 528-544, 2004.
-
(2004)
CRYPTO
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
19
-
-
77956195013
-
Data mining with differential privacy.
-
A. Friedman and A. Schuster. Data mining with differential privacy. In KDD, pages 493-502, 2010.
-
(2010)
KDD
, pp. 493-502
-
-
Friedman, A.1
Schuster, A.2
-
21
-
-
84863012396
-
Publishing search logs - a comparative study of privacy guarantees
-
M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke. Publishing search logs - a comparative study of privacy guarantees. IEEE Trans. Knowl. Data Eng., 24(3):520-532, 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.3
, pp. 520-532
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
22
-
-
2442449952
-
Mining frequent patterns without candidate generation: A frequent-pattern tree approach
-
J. Han, J. Pei, Y. Yin, and R. Mao. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Min. Knowl. Discov., 8(1):53-87, 2004.
-
(2004)
Data Min. Knowl. Discov.
, vol.8
, Issue.1
, pp. 53-87
-
-
Han, J.1
Pei, J.2
Yin, Y.3
Mao, R.4
-
23
-
-
78650518102
-
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1):1021-1032, 2010.
-
(2010)
Boosting the accuracy of differentially private histograms through consistency. PVLDB
, vol.3
, Issue.1
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
24
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He and J. F. Naughton. Anonymization of set-valued data via top-down, local generalization. PVLDB, 2(1):934-945, 2009.
-
(2009)
PVLDB
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
25
-
-
77952279809
-
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino. Private record matching using differential privacy. In EDBT, pages 123-134, 2010.
-
(2010)
Private record matching using differential privacy. EDBT
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
26
-
-
84865663496
-
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, pages 171-180, 2009.
-
(2009)
Releasing search queries and clicks privately. WWW
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
27
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the netflix prize contenders. In KDD, pages 627-636, 2009.
-
(2009)
KDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
29
-
-
80052663001
-
-
N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In KDD, pages 493-501, 2011.
-
(2011)
Differentially private data release for data mining. KDD
, pp. 493-501
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
30
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith. Smooth sensitivity and sampling in private data analysis. In STOC, pages 75-84, 2007.
-
(2007)
STOC
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
33
-
-
79959540412
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng., 23(8):1200-1214, 2011.
-
(2011)
IEEE Trans. Knowl. Data Eng.
, vol.23
, Issue.8
, pp. 1200-1214
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
34
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A. W.-C. Fu, and P. S. Yu. Anonymizing transaction databases for publication. In KDD, pages 767-775, 2008.
-
(2008)
KDD
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.-C.3
Yu, P.S.4
|