-
2
-
-
76749098908
-
Movement data anonymity through generalization
-
G. Andrienko, N. Andrienko, F. Giannotti, A. Monreale, and D. Pedreschi. Movement data anonymity through generalization. In Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'09, 2009.
-
(2009)
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, SPRINGL'09
-
-
Andrienko, G.1
Andrienko, N.2
Giannotti, F.3
Monreale, A.4
Pedreschi, D.5
-
6
-
-
84880540940
-
Frequent grams based embedding for privacy preserving record linkage
-
L. Bonomi, L. Xiong, R. Chen, and B. C. M. Fung. Frequent grams based embedding for privacy preserving record linkage. In CIKM, 2012.
-
(2012)
CIKM
-
-
Bonomi, L.1
Xiong, L.2
Chen, R.3
Fung, B.C.M.4
-
10
-
-
84857261278
-
Privacy-preserving trajectory data publishering by local suppression
-
R. Chen, B. C. Fung, N. Mohammed, B. C. Desai, and K. Wang. Privacy-preserving trajectory data publishering by local suppression. Information Sciences, (0):-, 2011.
-
(2011)
Information Sciences
-
-
Chen, R.1
Fung, B.C.2
Mohammed, N.3
Desai, B.C.4
Wang, K.5
-
12
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In in ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
13
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006.
-
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
84872862536
-
Privbasis: Frequent itemset mining with differential privacy
-
July
-
N. Li, W. Qardaji, D. Su, and J. Cao. Privbasis: frequent itemset mining with differential privacy. Proc. VLDB Endow., 5(11), July 2012.
-
(2012)
Proc. VLDB Endow
, vol.5
, Issue.11
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
20
-
-
0027113212
-
Approximate string-matching with q-grams and maximal matches
-
Jan.
-
E. Ukkonen. Approximate string-matching with q-grams and maximal matches. Theor. Comput. Sci., 92(1), Jan. 1992.
-
(1992)
Theor. Comput. Sci.
, vol.92
, Issue.1
-
-
Ukkonen, E.1
-
22
-
-
79959998772
-
Ireduct: Differential privacy with reduced relative errors
-
X. Xiao, G. Bender, M. Hay, and J. Gehrke. ireduct: differential privacy with reduced relative errors. In Proceedings of the 2011 ACM SIGMOD International Conference on Management of data, SIGMOD'11, 2011.
-
(2011)
Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, SIGMOD'11
-
-
Xiao, X.1
Bender, G.2
Hay, M.3
Gehrke, J.4
-
23
-
-
70349095406
-
Anonymizing moving objects: How to hide a mob in a crowd?
-
R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang. Anonymizing moving objects: how to hide a mob in a crowd? In Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, EDBT'09, 2009.
-
(2009)
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, EDBT'09
-
-
Yarovoy, R.1
Bonchi, F.2
Lakshmanan, L.V.S.3
Wang, W.H.4
-
24
-
-
84875100172
-
On differentially private frequent itemset mining
-
Nov.
-
C. Zeng, J. F. Naughton, and J.-Y. Cai. On differentially private frequent itemset mining. Proc. VLDB Endow., 6(1), Nov. 2012.
-
(2012)
Proc. VLDB Endow
, vol.6
, Issue.1
-
-
Zeng, C.1
Naughton, J.F.2
Cai, J.-Y.3
|