-
1
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
June
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Computing Surveys, vol. 42, no. 4, pp. 14:1-14:53, June 2010.
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 141-1453
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
3
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
4
-
-
79956324165
-
Finding itemsetsharing patterns in a large itemset-associated graph
-
M. Fukuzaki, M. Seki, H. Kashima, and J. Sese, "Finding itemsetsharing patterns in a large itemset-associated graph," in Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining, 2010, pp. 147-159.
-
(2010)
Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
, pp. 147-159
-
-
Fukuzaki, M.1
Seki, M.2
Kashima, H.3
Sese, J.4
-
5
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression," SRI International, Tech. Rep., 1998.
-
(1998)
SRI International, Tech. Rep.
-
-
Samarati, P.1
Sweeney, L.2
-
6
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
March
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, March 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
7
-
-
34147125465
-
Handicapping attacker's confidence: An alternative to k-anonymization
-
April
-
K. Wang, B. C. M. Fung, and P. S. Yu, "Handicapping attacker's confidence: an alternative to k-anonymization," Knowledge and Information Systems, vol. 11, pp. 345-368, April 2007.
-
(2007)
Knowledge and Information Systems
, vol.11
, pp. 345-368
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
8
-
-
0033204106
-
On power-law relationships of the internet topology
-
M. Faloutsos, P. Faloutsos, and C. Faloutsos, "On power-law relationships of the internet topology," in Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, 1999, pp. 251-262.
-
(1999)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
10
-
-
34248205060
-
Graph evolution: Densification and shrinking diameters
-
March
-
J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graph evolution: Densification and shrinking diameters," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, March 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
-
-
Leskovec, J.1
Kleinberg, J.2
Faloutsos, C.3
-
11
-
-
79960442271
-
Anonymity meets game theory: Secure data integration with malicious participants
-
August
-
N. Mohammed, B. C. M. Fung, and M. Debbabi, "Anonymity meets game theory: secure data integration with malicious participants," Very Large Data Bases Journal (VLDBJ), vol. 20, no. 4, pp. 567-588, August 2011.
-
(2011)
Very Large Data Bases Journal (VLDBJ)
, vol.20
, Issue.4
, pp. 567-588
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
12
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
October
-
N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C.-K. Lee, "Centralized and distributed anonymization for high-dimensional healthcare data," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 4, no. 4, pp. 18:1-18:33, October 2010.
-
(2010)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.4
, Issue.4
, pp. 181-1833
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.-K.4
-
13
-
-
0035007850
-
Mafia: A maximal frequent itemset algorithm for transactional databases
-
D. Burdick, M. Calimlim, and J. Gehrke, "Mafia: A maximal frequent itemset algorithm for transactional databases," in Proceedings of the 17th International Conference on Data Engineering, 2001, pp. 443-452.
-
(2001)
Proceedings of the 17th International Conference on Data Engineering
, pp. 443-452
-
-
Burdick, D.1
Calimlim, M.2
Gehrke, J.3
-
14
-
-
77954728128
-
K-isomorphism: Privacy preserving network publication against structural attacks
-
J. Cheng, A. W.-C. Fu, and J. Liu, "K-isomorphism: Privacy preserving network publication against structural attacks," in Proceedings of the ACM SIGMOD International Conference on Management of data, 2010, pp. 459-470.
-
(2010)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 459-470
-
-
Cheng, J.1
Fu, A.W.-C.2
Liu, J.3
-
15
-
-
79957862437
-
Identity obfuscation in graphs through the information theoretic lens
-
F. Bonchi, A. Gionis, and T. Tassa, "Identity obfuscation in graphs through the information theoretic lens," in Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE), 2011, pp. 924-935.
-
(2011)
Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE)
, pp. 924-935
-
-
Bonchi, F.1
Gionis, A.2
Tassa, T.3
-
16
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis, "Resisting structural re-identification in anonymized social networks," Proceedings of the VLDB Endowment, vol. 1, no. 1, pp. 102-114, 2008.
-
(2008)
Proceedings of the VLDB Endowment
, vol.1
, Issue.1
, pp. 102-114
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
17
-
-
79952432617
-
A clustering approach for data and structural anonymity in social networks
-
A. Campan and T. M. Truta, "A clustering approach for data and structural anonymity in social networks," in In Proceedings of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD Workshop, 2008, pp. 1-10.
-
(2008)
Proceedings of the 2nd ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD Workshop
, pp. 1-10
-
-
Campan, A.1
Truta, T.M.2
-
18
-
-
41849128290
-
Anonymizing social networks
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, "Anonymizing social networks," Computer Science Department, University of Massachusetts Amherst, Tech. Rep. 07-19, 2007.
-
(2007)
Computer Science Department, University of Massachusetts Amherst, Tech. Rep. 07-19
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
19
-
-
84856191070
-
-
Kluwer Academic Publishers, ch. Managing and Mining Graph Data
-
X. Wu, X. Ying, K. Liu, and L. Chen, A Survey of Algorithms for Privacy-Preservation of Graphs and Social Networks. Kluwer Academic Publishers, 2009, ch. Managing and Mining Graph Data.
-
(2009)
A Survey of Algorithms for Privacy-Preservation of Graphs and Social Networks
-
-
Wu, X.1
Ying, X.2
Liu, K.3
Chen, L.4
|