-
1
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
Terrovitis, M., Mamoulis, N., Kalnis, P.: Privacy-preserving anonymization of set-valued data. In: Proceedings of the VLDB Endowment (PVLDB 2008), vol. 1(1), pp. 115-125 (2008)
-
(2008)
Proceedings of the VLDB Endowment (PVLDB 2008)
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
2
-
-
78049372159
-
Anonymization of Set-Valued Data via Top-Down, Local Generalization
-
He, Y., Naughton, J.F.: Anonymization of Set-Valued Data via Top-Down, Local Generalization. In: Proceedings of the VLDB Endowment (PVLDB 2009), vol. 2(1), pp. 934-945 (2009)
-
(2009)
Proceedings of the VLDB Endowment (PVLDB 2009)
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
3
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2008), pp. 265-273 (2008)
-
(2008)
Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2008)
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
4
-
-
80052013720
-
Can the utility of anonymized data be used for privacy breaches
-
Wong, R.C.W., Fu, A., Wang, K., Yu, P.S., Pei, J.: Can the utility of anonymized data be used for privacy breaches. ACM Transaction on Knowledge Discovery from Data (TKDD 2011) 5(3), 16 (2011)
-
(2011)
ACM Transaction on Knowledge Discovery from Data (TKDD 2011)
, vol.5
, Issue.3
, pp. 16
-
-
Wong, R.C.W.1
Fu, A.2
Wang, K.3
Yu, P.S.4
Pei, J.5
-
5
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
84861595370
-
Publishing Set-Valued Data via Differential Privacy
-
Chen, R., Mohammed, N., Fung, B.C.M., Desai, B.C., Xiong, L.: Publishing Set-Valued Data via Differential Privacy. In: PVLDB 2011, vol. 4(11), pp. 1087-1098 (2011)
-
(2011)
PVLDB 2011
, vol.4
, Issue.11
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
8
-
-
84866022540
-
Differentially private transit data publication: A case study on the montreal transportation system
-
Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the montreal transportation system. In: Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2012), pp. 213-221 (2012)
-
(2012)
Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2012)
, pp. 213-221
-
-
Chen, R.1
Fung, B.C.M.2
Desai, B.C.3
Sossou, N.M.4
-
9
-
-
77954717626
-
Differential pirvacy under continual observation
-
Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential pirvacy under continual observation. In: Proc. of the 42nd ACM Symposium on Theory of Computing (STOC 2010), pp. 715-724 (2010)
-
(2010)
Proc. of the 42nd ACM Symposium on Theory of Computing (STOC 2010)
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
-
10
-
-
84855245645
-
Private and continual release of statistics
-
Chan, T.-H.H., Shi, E., Song, D.: Private and continual release of statistics. ACM Transactions on Information and System Security (TISS 2011) 14(3), 26 (2011)
-
(2011)
ACM Transactions on Information and System Security (TISS 2011)
, vol.14
, Issue.3
, pp. 26
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
84864195481
-
Differentially private histogram publication
-
Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G.: Differentially private histogram publication. In: Proc. of the 28th International Conference on Data Engineering (ICDE 2012), pp. 32-43 (2012)
-
(2012)
Proc. of the 28th International Conference on Data Engineering (ICDE 2012)
, pp. 32-43
-
-
Xu, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Yu, G.5
-
13
-
-
78650518102
-
Boosting the accuracy of differentially private histogram through consistency
-
Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histogram through consistency. In: Proceedings of the VLDB Endowment (PVLDB 2010), vol. 3(1), pp. 1021-1032 (2010)
-
(2010)
Proceedings of the VLDB Endowment (PVLDB 2010)
, vol.3
, Issue.1
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
14
-
-
84863012396
-
Publishing search logs - A comparative study of privacy guarantees
-
Götz, M., Machanavajjhala, A., Wang, G., Xiao, X., Gehrke, J.: Publishing search logs - a comparative study of privacy guarantees. IEEE Transaction Knowledge and Data Engineering (TKDE 2012) 24(3), 520-532 (2012)
-
(2012)
IEEE Transaction Knowledge and Data Engineering (TKDE 2012)
, vol.24
, Issue.3
, pp. 520-532
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
16
-
-
33750732631
-
Secure anonymization for incremental datasets
-
Jonker, W., Petkovic9́, M. (eds.) SDM 2006. Springer, Heidelberg
-
Byun, J.-W., Sohn, Y., Bertino, E., Li, N.: Secure anonymization for incremental datasets. In: Jonker, W., Petkovic9́, M. (eds.) SDM 2006. LNCS, vol. 4165, pp. 48-63. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4165
, pp. 48-63
-
-
Byun, J.-W.1
Sohn, Y.2
Bertino, E.3
Li, N.4
-
19
-
-
79959998772
-
iReduct: Differential privacy with reduced relative errors
-
Xiao, X., Bender, G., Hay, M., Gehrke, J.: iReduct: differential privacy with reduced relative errors. In: Proc. of the 31th International Conference on Management of Data (SIGMOD 2011), pp. 229-240 (2011)
-
(2011)
Proc. of the 31th International Conference on Management of Data (SIGMOD 2011)
, pp. 229-240
-
-
Xiao, X.1
Bender, G.2
Hay, M.3
Gehrke, J.4
-
20
-
-
84863906129
-
Differentially private summaries for sparse data
-
Gormode, G., Procopiuc,M., Srivastava, D.: Differentially private summaries for sparse data. In: Proc. of the 15th International Conference on Database Theory (ICDT 2012), pp. 299-311 (2012)
-
(2012)
Proc. of the 15th International Conference on Database Theory (ICDT 2012)
, pp. 299-311
-
-
Gormode, G.1
Procopiuc, M.2
Srivastava, D.3
|