-
1
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects databases
-
O. Abul, F. Bonchi, M. Nanni, Never walk alone: uncertainty for anonymity in moving objects databases, in: Proc. of the 24th IEEE International Conference on Data Engineering, pp. 376-385, 2008.
-
(2008)
Proc. of the 24th IEEE International Conference on Data Engineering
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
4
-
-
0035007850
-
MAFIA: A maximal frequent itemset algorithm for transactional databases
-
D. Burdick, M. Calimlim, J. Gehrke, MAFIA: a maximal frequent itemset algorithm for transactional databases, in: Proc. of the 17th IEEE International Conference on Data Engineering, pp. 443-452, 2001.
-
(2001)
Proc. of the 17th IEEE International Conference on Data Engineering
, pp. 443-452
-
-
Burdick, D.1
Calimlim, M.2
Gehrke, J.3
-
6
-
-
70349272731
-
Preserving RFID data privacy
-
B.C.M. Fung, K. Al-Hussaeni, M. Cao, Preserving RFID data privacy, in: Proc. of the 3rd Annual IEEE International Conference on RFID, pp. 200-207, 2009.
-
(2009)
Proc. of the 3rd Annual IEEE International Conference on RFID
, pp. 200-207
-
-
Fung, B.C.M.1
Al-Hussaeni, K.2
Cao, M.3
-
7
-
-
72949097416
-
Privacy protection for RFID data
-
B.C.M. Fung, M. Cao, B.C. Desai, H. Xu, Privacy protection for RFID data, in: Proc. of the 24th ACM Symposium on Applied Computing, pp. 1528-1535, 2009.
-
(2009)
Proc. of the 24th ACM Symposium on Applied Computing
, pp. 1528-1535
-
-
Fung, B.C.M.1
Cao, M.2
Desai, B.C.3
Xu, H.4
-
8
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B.C.M. Fung, K. Wang, R. Chen, and P.S. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys 42 4 2010 14:1 14:53
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 141-1453
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
10
-
-
52649106883
-
On the anonymization of sparse high-dimensional data
-
G. Ghinita, Y. Tao, P. Kalnis, On the anonymization of sparse high-dimensional data, in: Proc. of the 24th IEEE International Conference on Data Engineering, pp. 715-724, 2008.
-
(2008)
Proc. of the 24th IEEE International Conference on Data Engineering
, pp. 715-724
-
-
Ghinita, G.1
Tao, Y.2
Kalnis, P.3
-
11
-
-
36849001879
-
Trajectory pattern mining
-
F. Giannotti, M. Nanni, D. Pedreschi, F. Pinelli, Trajectory pattern mining, in: Proc. of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 330-339, 2007.
-
(2007)
Proc. of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 330-339
-
-
Giannotti, F.1
Nanni, M.2
Pedreschi, D.3
Pinelli, F.4
-
12
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He, J.F. Naughton, Anonymization of set-valued data via top-down, local generalization, in: Proc. of the 35th International Conference on Very Large Data Bases, pp. 934-945, 2009.
-
(2009)
Proc. of the 35th International Conference on Very Large Data Bases
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
13
-
-
76749111694
-
Efficient multidimensional suppression for k-anonymity
-
S. Kisilevich, L. Rokach, Y. Elovici, and B. Shapira Efficient multidimensional suppression for k-anonymity IEEE Transactions on Knowledge and Data Engineering 22 3 2010 334 347
-
(2010)
IEEE Transactions on Knowledge and Data Engineering
, vol.22
, Issue.3
, pp. 334-347
-
-
Kisilevich, S.1
Rokach, L.2
Elovici, Y.3
Shapira, B.4
-
14
-
-
77949349871
-
Traclass: Trajectory classification using hierarchical region-based and trajectory-based clustering
-
J.-G. Lee, J. Han, X. Li, H. Gonzalez, Traclass: trajectory classification using hierarchical region-based and trajectory-based clustering, in: Proc. of the 34th International Conference on Very Large Data Bases, pp. 1081-1094, 2008.
-
(2008)
Proc. of the 34th International Conference on Very Large Data Bases
, pp. 1081-1094
-
-
Lee, J.-G.1
Han, J.2
Li, X.3
Gonzalez, H.4
-
15
-
-
35449007737
-
Trajectory clustering: A partition-and-group framework
-
J.-G. Lee, J. Han, K.-Y. Whang, Trajectory clustering: a partition-and-group framework, in: Proc. of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 593-604, 2007.
-
(2007)
Proc. of the 2007 ACM SIGMOD International Conference on Management of Data
, pp. 593-604
-
-
Lee, J.-G.1
Han, J.2
Whang, K.-Y.3
-
16
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
K. LeFevre, D.J. DeWitt, R. Ramakrishnan, Mondrian multidimensional k-anonymity, in: Proc. of the 22nd IEEE International Conference on Data Engineering, pp. 25, 2006.
-
(2006)
Proc. of the 22nd IEEE International Conference on Data Engineering
, pp. 25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
19
-
-
33745906794
-
Motion-alert: Automatic anomaly detection in massive moving objects
-
X. Li, J. Han, S. Kim, Motion-alert: automatic anomaly detection in massive moving objects, in: Proc. of IEEE International Conference on Intelligence and Security Informatics, pp. 166-177, 2006.
-
(2006)
Proc. of IEEE International Conference on Intelligence and Security Informatics
, pp. 166-177
-
-
Li, X.1
Han, J.2
Kim, S.3
-
20
-
-
37849006890
-
Traffic density-based discovery of hot routes in road networks
-
X. Li, J. Han, J.-G. Lee, H. Gonzalez, Traffic density-based discovery of hot routes in road networks, in: Proc. of the 10th International Symposium on Spatial and Temporal Databases, pp. 441-459, 2007.
-
(2007)
Proc. of the 10th International Symposium on Spatial and Temporal Databases
, pp. 441-459
-
-
Li, X.1
Han, J.2
Lee, J.-G.3
Gonzalez, H.4
-
21
-
-
77952262067
-
Data publishing against realistic adversaries
-
A. Machanava, J. Gehrke, M. Gotz, Data publishing against realistic adversaries, in: Proc. of the 35th International Conference on Very Large Data Bases, pp. 790-801, 2009.
-
(2009)
Proc. of the 35th International Conference on Very Large Data Bases
, pp. 790-801
-
-
MacHanava, A.1
Gehrke, J.2
Gotz, M.3
-
23
-
-
77958579043
-
Privacy-preserving data mining: A feature set partitioning approach
-
N. Matatov, L. Rokach, and O. Maimon Privacy-preserving data mining: a feature set partitioning approach Information Sciences 180 4 2010 2696 2720
-
(2010)
Information Sciences
, vol.180
, Issue.4
, pp. 2696-2720
-
-
Matatov, N.1
Rokach, L.2
Maimon, O.3
-
24
-
-
74549179664
-
Walking in the crowd: Anonymizing trajectory data for pattern analysis
-
N. Mohammed, B.C.M. Fung, M. Debbabi, Walking in the crowd: anonymizing trajectory data for pattern analysis, in: Proc. of the 18th ACM Conference on Information and Knowledge Management, pp. 1441-1444, 2009.
-
(2009)
Proc. of the 18th ACM Conference on Information and Knowledge Management
, pp. 1441-1444
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
25
-
-
84874112371
-
Preserving privacy and utility in RFID data publishing
-
Concordia University, Montreal, Canada, September 2010
-
N. Mohammed, B.C.M. Fung, M. Debbabi, Preserving privacy and utility in RFID data publishing, Technical Report 6850, Concordia University, Montreal, Canada, September 2010.
-
Technical Report 6850
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
26
-
-
70350686724
-
Anonymizing healthcare data: A case study on the blood transfusion service
-
N. Mohammed, B.C.M. Fung, P.C.K. Hung, C.K. Lee, Anonymizing healthcare data: a case study on the blood transfusion service, in: Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1285-1294, 2009.
-
(2009)
Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1285-1294
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.K.4
-
27
-
-
33750935681
-
RFID patient tagging and database system
-
M. O'Halloran, M. Glavin, RFID patient tagging and database system, in: Proc. of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 162, 2006.
-
(2006)
Proc. of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies
, pp. 162
-
-
O'Halloran, M.1
Glavin, M.2
-
28
-
-
79953093725
-
Smart card data in public transit planning: A review
-
M.-P. Pelletier, M. Trepanier, C. Morency, Smart card data in public transit planning: a review, Technical Report CIRRELT-2009-46, Interuniversity Research Centre on Enterprise Networks, Logistics and Transportation, 2009.
-
(2009)
Technical Report CIRRELT-2009-46, Interuniversity Research Centre on Enterprise Networks, Logistics and Transportation
-
-
Pelletier, M.-P.1
Trepanier, M.2
Morency, C.3
-
29
-
-
84885396762
-
Pattern-preserving k-anonymization of sequences and its application to mobility data mining
-
R.G. Pensa, A. Monreale, F. Pinelli, D. Pedreschi, Pattern-preserving k-anonymization of sequences and its application to mobility data mining, in: Proc. of the 1st International Workshop on Privacy in Location-Based Applications, 2008.
-
(2008)
Proc. of the 1st International Workshop on Privacy in Location-Based Applications
-
-
Pensa, R.G.1
Monreale, A.2
Pinelli, F.3
Pedreschi, D.4
-
32
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, P. Kalnis, Privacy-preserving anonymization of set-valued data, in: Proc. of the 34th International Conference on Very Large Data Bases, pp. 115-125, 2008.
-
(2008)
Proc. of the 34th International Conference on Very Large Data Bases
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
34
-
-
34147125465
-
Handicapping attacker's confidence: An alternative to k-anonymization
-
K. Wang, B.C.M. Fung, and P.S. Yu Handicapping attacker's confidence: an alternative to k-anonymization Knowledge and Information Systems 11 3 2007 345 368
-
(2007)
Knowledge and Information Systems
, vol.11
, Issue.3
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
35
-
-
84874114425
-
Parallelization of r-programs with gridr in a gps-trajectory mining application
-
D. Wegener, D. Hecker, C. Korner, M. May, M. Mock, Parallelization of r-programs with gridr in a gps-trajectory mining application, in: Proc. of the 1st Ubiquitous Knowledge Discovery Workshop in conjunction with European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2008.
-
(2008)
Proc. of the 1st Ubiquitous Knowledge Discovery Workshop in Conjunction with European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
-
-
Wegener, D.1
Hecker, D.2
Korner, C.3
May, M.4
Mock, M.5
-
36
-
-
69949111709
-
(α, k)-anonymous data publishing
-
R.C.W. Wong, J. Li, A.W.C. Fu, and K. Wang (α, k)-anonymous data publishing Journal of Intelligent Information Systems 33 2 2009 209 234
-
(2009)
Journal of Intelligent Information Systems
, vol.33
, Issue.2
, pp. 209-234
-
-
Wong, R.C.W.1
Li, J.2
Fu, A.W.C.3
Wang, K.4
-
38
-
-
67049167712
-
Publishing sensitive transactions for itemset utility
-
Y. Xu, B.C.M. Fung, K. Wang, A.W.C. Fu, J. Pei, Publishing sensitive transactions for itemset utility, in: Proc. of the 8th IEEE International Conference on Data Mining, pp. 1109-1114, 2008.
-
(2008)
Proc. of the 8th IEEE International Conference on Data Mining
, pp. 1109-1114
-
-
Xu, Y.1
Fung, B.C.M.2
Wang, K.3
Fu, A.W.C.4
Pei, J.5
-
39
-
-
65449148368
-
Anonymizing transaction databases for publication
-
Y. Xu, K. Wang, A.W.C. Fu, P.S. Yu, Anonymizing transaction databases for publication, in: Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 767-775, 2008.
-
(2008)
Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 767-775
-
-
Xu, Y.1
Wang, K.2
Fu, A.W.C.3
Yu, P.S.4
-
40
-
-
70349095406
-
Anonymizing moving objects: How to hide a MOB in a crowd?
-
R. Yarovoy, F. Bonchi, L.V.S. Lakshmanan, W.H. Wang, Anonymizing moving objects: How to hide a MOB in a crowd? in: Proc. of the 12th International Conference on Extending Database Technology, pp. 72-83, 2009.
-
(2009)
Proc. of the 12th International Conference on Extending Database Technology
, pp. 72-83
-
-
Yarovoy, R.1
Bonchi, F.2
Lakshmanan, L.V.S.3
Wang, W.H.4
|