-
1
-
-
79960840976
-
Injecting purpose and trust into data anonymization
-
Sun, X., Wang, H., Li, J., Zhang, Y.: Injecting purpose and trust into data anonymization. Computers & Security 30, 332-345 (2011)
-
(2011)
Computers & Security
, vol.30
, pp. 332-345
-
-
Sun, X.1
Wang, H.2
Li, J.3
Zhang, Y.4
-
2
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty
-
Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based System 10(5), 571-588 (2002)
-
(2002)
Fuzziness and Knowledge-Based System
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
3
-
-
33749568323
-
Workload-aware anonymization
-
LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, USA, pp. 277-286 (2006)
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, USA
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
4
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: Proceedings of the 21st International Conference on Data Engineering, pp. 205-216 (2005)
-
(2005)
Proceedings of the 21st International Conference on Data Engineering
, pp. 205-216
-
-
Fung, B.1
Wang, K.2
Yu, P.3
-
5
-
-
19544380211
-
Bottom-up generalization-A data mining solution to privacy protection
-
Wang, K., Yu, P., Chakraborty, S.: Bottom-up generalization-A data mining solution to privacy protection. In: Proceedings of the 4th IEEE International Conference on Data Mining, Brighton, UK, pp. 249-256 (2004)
-
(2004)
Proceedings of the 4th IEEE International Conference on Data Mining, Brighton, UK
, pp. 249-256
-
-
Wang, K.1
Yu, P.2
Chakraborty, S.3
-
6
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
Iyengar, V.: Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM SIGKDD Iinternational Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp. 279-288 (2002)
-
(2002)
Proceedings of the 8th ACM SIGKDD Iinternational Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada
, pp. 279-288
-
-
Iyengar, V.1
-
7
-
-
30644474612
-
Purpose based access control of complex data for privacy protection
-
Byun, J.W., Bertino, E., Li, N.: Purpose based access control of complex data for privacy protection. In: The 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 102-110 (2005)
-
(2005)
The 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden
, pp. 102-110
-
-
Byun, J.W.1
Bertino, E.2
Li, N.3
-
8
-
-
84901654868
-
Towards Application-Oriented Data Anonymization
-
Xiong, L., Rangachari, K.: Towards Application-Oriented Data Anonymization. In: First SIAM International Workshop on Practical Privacy-Preserving Data Mining, Atlanta, US, pp. 1-10 (2008)
-
(2008)
First SIAM International Workshop on Practical Privacy-Preserving Data Mining, Atlanta, US
, pp. 1-10
-
-
Xiong, L.1
Rangachari, K.2
-
9
-
-
0242410408
-
Benchmarking attribute selection techniques for discrete class data mining
-
Hall, M., Holmes, G.: Benchmarking attribute selection techniques for discrete class data mining. IEEE Transactions on Knowledge and Data Engineering 15(6), 1437-1447 (2003)
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.6
, pp. 1437-1447
-
-
Hall, M.1
Holmes, G.2
-
10
-
-
0004493166
-
On the approximation of minimizing non zero variables or unsatisfied relations in linear systems
-
Amaldi, E., Kann, V.: On the approximation of minimizing non zero variables or unsatisfied relations in linear systems. Theoretical Computer Science 209, 237-260 (1998)
-
(1998)
Theoretical Computer Science
, vol.209
, pp. 237-260
-
-
Amaldi, E.1
Kann, V.2
-
12
-
-
77951201056
-
Privacy-Preserving Data Publishing - A Survey of Recent Development
-
Fung, B., Wang, K., Chen, R., Yu, P.: Privacy-Preserving Data Publishing - A Survey of Recent Development. ACM Computing Surveys 42(4), Article 14 (2010)
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
, pp. 14
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
14
-
-
33746335051
-
Differential privacy
-
Dwork, C.: Differential privacy. In: Proceedings of 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy, pp. 1-12 (2006)
-
(2006)
Proceedings of 33rd International Colloquium on Automata, Languages and Programming, Venice, Italy
, pp. 1-12
-
-
Dwork, C.1
-
15
-
-
84881650268
-
On syntactic anonymity and differential privacy
-
Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. Transactions of Data Privacy 6, 161-183 (2013)
-
(2013)
Transactions of Data Privacy
, vol.6
, pp. 161-183
-
-
Clifton, C.1
Tassa, T.2
-
16
-
-
84901659311
-
Improving the utility of differentially private data releases via k-anonymity
-
abs/1307.0966
-
Soria-Comas, J., Domingo-Ferrer, J., Sanchez, D., Martinez, S.: Improving the utility of differentially private data releases via k-anonymity. CoRR abs/1307.0966 (2013)
-
(2013)
CoRR
-
-
Soria-Comas, J.1
Domingo-Ferrer, J.2
Sanchez, D.3
Martinez, S.4
-
17
-
-
84874886418
-
Provably private data anonyization: Or, k-anonymity meets differential privacy
-
abs/1101.2604
-
Li, N., Qardaji, W.: Su, Dong.: Provably private data anonyization: Or, k-anonymity meets differential privacy, CoRR abs/1101.2604 (2011)
-
(2011)
CoRR
-
-
Li, N.1
Qardaji, W.2
Su, D.3
-
18
-
-
0031381525
-
Wrappers for feature subset selection
-
Kohavi, R., John, G.H.: Wrappers for feature subset selection. Artificial Intelligence 97, 273-324 (1997)
-
(1997)
Artificial Intelligence
, vol.97
, pp. 273-324
-
-
Kohavi, R.1
John, G.H.2
-
19
-
-
84901659302
-
-
UCI repository, http://archive.ics.uci.edu/ml/
-
-
-
-
20
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Lefevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Proceedings of the 22nd International Conference on Data Engineering, Washington DC, USA, pp. 25-36 (2006)
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering, Washington DC, USA
, pp. 25-36
-
-
Lefevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
21
-
-
80053237778
-
On the design and analysis of the privacy-preserving SVM classifier
-
Lin, K., Chen, M.: On the design and analysis of the privacy-preserving SVM classifier. IEEE Transaction on Knowedge and Data Engineering 23(11), 1704-1717 (2011)
-
(2011)
IEEE Transaction on Knowedge and Data Engineering
, vol.23
, Issue.11
, pp. 1704-1717
-
-
Lin, K.1
Chen, M.2
|