-
1
-
-
0020843592
-
Source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers
-
H. Yamamoto, "A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers," IEEE Trans. Inf. Theory, vol. 29, no. 6, pp. 918-923, Nov. 1983. (Pubitemid 14486342)
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.6
, pp. 918-923
-
-
Yamamoto Hirosuke1
-
2
-
-
84878266591
-
Smart meter privacy: A theoretical framework
-
DOI: 10.1109/TSG.2012.2211046, early access article
-
L. Sankar, S. R. Rajagopalan, S. Mohajer, and H. V. Poor, "Smart meter privacy: A theoretical framework," IEEE Trans. Smart Grid, DOI: 10.1109/TSG.2012.2211046, early access article.
-
IEEE Trans. Smart Grid
-
-
Sankar, L.1
Rajagopalan, S.R.2
Mohajer, S.3
Poor, H.V.4
-
3
-
-
0036811662
-
Anonymity: A model for protecting privacy
-
L. Sweeney,"-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness, Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness, Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
4
-
-
50249086141
-
Differential privacy
-
Venice, Italy, Jul.
-
C. Dwork, "Differential privacy," in Proc. 33rd Int. Colloq. Automata, Lang., Prog., Venice, Italy, Jul. 2006.
-
(2006)
Proc. 33rd Int. Colloq. Automata, Lang., Prog
-
-
Dwork, C.1
-
5
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Oakland, CA, USA May.
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in Proc. IEEE Int. Symp. Security and Privacy, Oakland, CA, USA, May 2008, pp. 111-125.
-
(2008)
Proc. IEEE Int. Symp. Security and Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
6
-
-
79952434371
-
An information-theoretic approach to privacy
-
Monticello, IL, USA, Sep.
-
L. Sankar, S. R. Rajagopalan, and H. V. Poor, "An information-theoretic approach to privacy," in Proc. 48th Annual Allerton Conf. Commun., Control, and Computing, Monticello, IL, USA, Sep. 2010, pp. 1220-1227.
-
(2010)
Proc. 48th Annual Allerton Conf. Commun., Control, and Computing
, pp. 1220-1227
-
-
Sankar, L.1
Rajagopalan, S.R.2
Poor, H.V.3
-
7
-
-
84878283398
-
Multiple imputation for statistical diclosure limitation
-
Nov.
-
T. E. Raghunathan, J. P. Reiter, and D. B. Rubin, "Multiple imputation for statistical diclosure limitation," IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1877-1894, Nov. 1997.
-
(1997)
IEEE Trans. Inf. Theory
, vol.43
, Issue.6
, pp. 1877-1894
-
-
Raghunathan, T.E.1
Reiter, J.P.2
Rubin, D.B.3
-
8
-
-
84878287417
-
-
London, U.K.: Oxford Univ. Press
-
A. Dobra, S. Fienberg, and M. Trottini, Assessing the Risk of Disclosure of Confidential Categorical Data. London, U.K.: Oxford Univ. Press, 2000, vol. 7, pp. 125-144.
-
(2000)
Assessing the Risk of Disclosure of Confidential Categorical Data
, vol.7
, pp. 125-144
-
-
Dobra, A.1
Fienberg, S.2
Trottini, M.3
-
9
-
-
80053281091
-
On privacy-preserving histograms
-
Edinburgh, Scotland, Jul.
-
S. Chawla, C. Dwork, F. McSherry, and K. Talwar, "On privacy-preserving histograms," in Proc. 21st Conf. Uncert. Art. Intell., Edinburgh, Scotland, Jul. 2005.
-
(2005)
Proc. 21st Conf. Uncert. Art. Intell
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Talwar, K.4
-
10
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubrama-niam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, p. 24, 2007.
-
(2007)
ACM Trans. Knowl. Discov. Data
, vol.1
, Issue.1
, pp. 24
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubrama-Niam, M.4
-
11
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, CA, USA, May
-
D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. 20th Symp. Principles of Database Systems, Santa Barbara, CA, USA, May 2001.
-
(2001)
Proc. 20th Symp. Principles of Database Systems
-
-
Agrawal, D.1
Aggarwal, C.2
-
13
-
-
77951189908
-
A practical differentially private random decision tree classifier
-
Miami, FL, USA, Dec.
-
G. Jagannathan, K. Pillaipakkamnatt, and R. N. Wright, "A practical differentially private random decision tree classifier," in Proc. ICDM Int. Workshop Privacy Aspects of Data Mining, Miami, FL, USA, Dec. 2009.
-
(2009)
Proc. ICDM Int. Workshop Privacy Aspects of Data Mining
-
-
Jagannathan, G.1
Pillaipakkamnatt, K.2
Wright, R.N.3
-
14
-
-
70350634219
-
On the tradeoff between privacy and utility in data publishing
-
Paris, France
-
T. Li and N. Li, "On the tradeoff between privacy and utility in data publishing," in Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Paris, France, 2009, pp. 517-526.
-
(2009)
Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining
, pp. 517-526
-
-
Li, T.1
Li, N.2
-
15
-
-
79960008635
-
On the relation between differential privacy and quantitative information flow
-
Zurich, Switzerland
-
M. Alvim and M. Andrés, "On the relation between differential privacy and quantitative information flow," in Proc. 38th Int. Conf. Automata, Languages and Programming-Volume Part II, Zurich, Switzerland, 2011, pp. 60-76.
-
(2011)
Proc. 38th Int. Conf. Automata, Languages and Programming-Volume Part II
, pp. 60-76
-
-
Alvim, M.1
Andrés, M.2
-
16
-
-
84875725863
-
Privacy against statistical inference
-
Monticello, IL, USA, Sep.
-
F. du Pin Calmon and N. Fawaz, "Privacy against statistical inference," in Proc. 50th Annual Allerton Conf. on Commun., Control, and Computing, Monticello, IL, USA, Sep. 2012.
-
(2012)
Proc. 50th Annual Allerton Conf. on Commun., Control, and Computing
-
-
Du Pin Calmon, F.1
Fawaz, N.2
-
18
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
DOI 10.1007/s10115-004-0173-6
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "Random data perturbation techniques and privacy preserving data mining," J. Knowl. Inf. Sys., vol. 7, no. 4, pp. 387-414, May 2005. (Pubitemid 41166792)
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
19
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
Nov.
-
D. Rebollo-Monedero, J. Forne, and J. Domingo-Ferrer, "From t-closeness-like privacy to postrandomization via information theory," IEEE Trans. Knowl. Data Eng., vol. 22, no. 11, pp. 1623-1636, Nov. 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forne, J.2
Domingo-Ferrer, J.3
-
20
-
-
84878324954
-
Lossy discriminatory source coding: Side-information privacy
-
to be published
-
R. Tandon, L. Sankar, and H. V. Poor, "Lossy discriminatory source coding: Side-information privacy," IEEE Trans. Inform. Theory, to be published.
-
IEEE Trans. Inform. Theory
-
-
Tandon, R.1
Sankar, L.2
Poor, H.V.3
-
21
-
-
33747457509
-
An application of rate-distortion theory to a converse to the coding theorem
-
Jan.
-
J. T. Pinkston, "An application of rate-distortion theory to a converse to the coding theorem," IEEE Trans. Inf. Theory, vol. 15, no. 1, pp. 66-71, Jan. 1969.
-
(1969)
IEEE Trans. Inf. Theory
, vol.15
, Issue.1
, pp. 66-71
-
-
Pinkston, J.T.1
-
22
-
-
0016882596
-
The rate-distortion function for source coding with side information at the decoder
-
Jan.
-
A. D. Wyner and J. Ziv, "The rate-distortion function for source coding with side information at the decoder," IEEE Trans. Inf. Theory, vol. IT-22, no. 1, pp. 1-10, Jan. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.1
, pp. 1-10
-
-
Wyner, A.D.1
Ziv, J.2
-
23
-
-
49349120031
-
The rate-distortion function for source coding with side information at the decoder-ii: General sources
-
A. D. Wyner, "The rate-distortion function for source coding with side information at the decoder-ii: General sources," Inf. Control, vol. 38, no. 1, pp. 60-80, 1978.
-
(1978)
Inf. Control
, vol.38
, Issue.1
, pp. 60-80
-
-
Wyner, A.D.1
-
24
-
-
84855833423
-
Competitive privacy in the smart grid: An information-theoretic approach
-
Brussels, Belgium, Oct.
-
L. Sankar, S. Kar, R. Tandon, and H. V. Poor, "Competitive privacy in the smart grid: An information-theoretic approach," in Proc. 2nd IEEE Intl. Conf. Smart Grid Commun., Brussels, Belgium, Oct. 2011.
-
(2011)
Proc. 2nd IEEE Intl. Conf. Smart Grid Commun
-
-
Sankar, L.1
Kar, S.2
Tandon, R.3
Poor, H.V.4
|