-
1
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
Aug. 9
-
Barbaro, M. and Zeller, T. A face is exposed for AOL searcher no. 4417749. The New York Times (Aug. 9, 2006).
-
(2006)
The New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
2
-
-
84893517919
-
Coupled worlds privacy: Exploiting adversarial uncertainty in statistical data privacy
-
IEEE Computer Society Press, Washington, D.C.
-
thIEEE Annual Symposium on Foundations of Computer Science (Berkeley, CA, Oct. 27-29). IEEE Computer Society Press, Washington, D.C., 2013, 439-448.
-
(2013)
th IEEE Annual Symposium on Foundations of Computer Science (Berrkeley, CA, Oct. 27-29)
, pp. 439-448
-
-
Bassily, R.1
Groce, A.2
Katz, J.3
Smith, A.4
-
4
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
ACM Press, New York
-
thACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems (Baltimore, MD, June 13-16). ACM Press, New York, 2005, 128-138.
-
(2005)
th ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems (Baltimore, MD, June 13-16)
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
5
-
-
79955858775
-
Differentially private empirical risk minimization
-
July
-
Chaudhuri, K., Monteleoni, C., and Sarwate, A.D. Differentially private empirical risk minimization. Journal of Machine Learning Research 12 (July 2011), 1069-1109.
-
(2011)
Journal of Machine Learning Research
, vol.12
, pp. 1069-1109
-
-
Chaudhuri, K.1
Monteleoni, C.2
Sarwate, A.D.3
-
6
-
-
84937846451
-
On Web browsing privacy in anonymized netflows
-
USENIX Association, Berkeley, CA
-
thUSENIX Security Symposium (Boston, MA, Aug. 6-10). USENIX Association, Berkeley, CA, 2007, 23:1-23:14.
-
(2007)
th USENIX Security Symposium (Boston, MA, Aug. 6-10)
, vol.23
, Issue.1-23
, pp. 14
-
-
Coull, S.1
Collins, M.2
Wright, C.3
Monrose, F.4
Reiter, M.5
-
7
-
-
1142275486
-
Revealing information while preserving privacy
-
ACM Press, New York
-
ndACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (San Diego, CA, June 9-12). ACM Press, New York, 2003, 202-210.
-
(2003)
nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (San Diego, CA, June 9-12)
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
8
-
-
84865524308
-
Differential privacy with imperfect randomness
-
Springer-Verlag, Berlin, Heidelberg
-
ndAnnual Cryptology Conference (Santa Barbara, CA, Aug. 19-23). Springer-Verlag, Berlin, Heidelberg, 2012, 497-516.
-
(2012)
nd Annual Cryptology Conference (Santa Barbara, CA, Aug. 19-23)
, pp. 497-516
-
-
Dodis, Y.1
López-Alt, A.2
Mironov, I.3
Vadhan, S.P.4
-
9
-
-
33746335051
-
Differential privacy
-
Springer-Verlag, Berlin, Heidelberg
-
rdInternational Colloquium on Automata, Languages and Programming (Venice, Italy, July 9-16). Springer-Verlag, Berlin, Heidelberg, 2006, 1-12.
-
(2006)
rd International Colloquium on Automata, Languages and Programming (Venice, Italy, July 9-16)
, pp. 1-12
-
-
Dwork, C.1
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
Springer-Verlag, Berlin, Heidelberg
-
thAnnual International Conference on the Theory and Applications of Cryptographic Techniques (Saint Petersburg, Russia, May 28-June 1). Springer-Verlag, Berlin, Heidelberg, 2006, 486-503.
-
(2006)
th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Saint Petersburg, Russia, May 28-June 1)
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Springer-Verlag, Berlin, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., and Smith, A. Calibrating noise to sensitivity in private data analysis. In Proceedings of the Theory of Cryptography Conference (Columbia University, New York, Mar. 4-7). Springer-Verlag, Berlin, Heidelberg, 2006, 265-284.
-
(2006)
Proceedings of the Theory of Cryptography Conference (Columbia University, New York, Mar. 4-7)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
1142263341
-
Limiting privacy breaches in privacy-preserving data mining
-
ACM Press, New York
-
ndACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems (San Diego, CA, June 9-12). ACM Press, New York, 2003, 211-222.
-
(2003)
nd ACM SIGMOD-SIGACTSIGART Symposium on Principles of Database Systems (San Diego, CA, June 9-12)
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
13
-
-
57149146430
-
Information leakage in optimal anonymized and diversified data
-
Springer-Verlag, Berlin, Heidelberg
-
thInformation Hiding (Santa Barbara, CA, May 19-21). Springer-Verlag, Berlin, Heidelberg, 2008, 30-44.
-
(2008)
th Information Hiding (Santa Barbara, CA, May 19-21)
, pp. 30-44
-
-
Fang, C.1
Chang, E.-C.2
-
14
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
ACM Press, New York
-
thACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Las Vegas, Aug. 24-27). ACM Press, New York, 2008, 265-273.
-
(2008)
th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (Las Vegas, Aug. 24-27)
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
15
-
-
79953187235
-
Towards privacy for social networks: A zero-knowledge-based definition of privacy
-
Springer- Verlag, Berlin, Heidelberg
-
Gehrke, J., Lui, E., and Pass, R. Towards privacy for social networks: A zero-knowledge-based definition of privacy. In Proceedings of the Theory of Cryptography Conference (Providence, RI, Mar. 28-30). Springer- Verlag, Berlin, Heidelberg, 2011, .432-449.
-
(2011)
Proceedings of the Theory of Cryptography Conference (Providence, RI, Mar. 28-30)
, pp. 432-449
-
-
Gehrke, J.1
Lui, E.2
Pass, R.3
-
16
-
-
84864115847
-
Camera identification from scaled and cropped images
-
Feb. 26
-
Goljan, M. and Fridrich, J. Camera identification from scaled and cropped images. In Proceedings of Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents (Feb. 26, 2008); http:// proceedings.spiedigitallibrary.org/proceeding.aspx?articleid=812538
-
(2008)
Proceedings of Electronic Imaging, Forensics, Security, Steganography, and Watermarking of Multimedia Contents
-
-
Goljan, M.1
Fridrich, J.2
-
17
-
-
84871982259
-
Forensic content detection through power consumption
-
IEEE Press, Psicataway, NJ
-
Greveler, U., Justus, B., and Loehr, D. Forensic content detection through power consumption. In Proceedings of the IEEE International Conference on Communications (Ottawa, Canada, June 10-15). IEEE Press, Psicataway, NJ, 2012, 6759-6763.
-
(2012)
Proceedings of the IEEE International Conference on Communications (Ottawa, Canada, June 10-15)
, pp. 6759-6763
-
-
Greveler, U.1
Justus, B.2
Loehr, D.3
-
18
-
-
85076486849
-
Differential privacy under fire
-
USENIX Association, Berkeley, CA
-
thUSENIX Conference on Security (San Francisco, CA, Aug. 8-12). USENIX Association, Berkeley, CA, 2011, 33-33.
-
(2011)
th USENIX Conference on Security (San Francisco, CA, Aug. 8-12)
, pp. 33-33
-
-
Haeberlen, A.1
Pierce, B.C.2
Narayan, A.3
-
19
-
-
84904352532
-
Blowfish privacy: Tuning privacy-utility trade-offs using policies
-
ACM Press, New York
-
He, X., Machanavajjhala, A., and Ding, B. Blowfish privacy: Tuning privacy-utility trade-offs using policies. In Proceedings of the ACM SIGMOD/PODS International Conference on Management of Data (Snowbird, UT, June 22-27). ACM Press, New York, 2014, 1447-1458.
-
(2014)
Proceedings of the ACM SIGMOD/PODS International Conference on Management of Data (Snowbird, UT, June 22-27)
, pp. 1447-1458
-
-
He, X.1
Machanavajjhala, A.2
Ding, B.3
-
20
-
-
50849101381
-
Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density snp genotyping microarrays
-
Aug
-
Homer, N., Szelinger, S., Redman, M., Duggan, D., Tembe, W., Muehling, J., Pearson, J.V., Stephan, D.A., Nelson, S.F., and Craig, D.W. Resolving individuals contributing trace amounts of DNA to highly complex mixtures using high-density snp genotyping microarrays. PLoS Genetics 4, 8 (Aug. 2008).
-
(2008)
PLoS Genetics
, vol.4
, pp. 8
-
-
Homer, N.1
Szelinger, S.2
Redman, M.3
Duggan, D.4
Tembe, W.5
Muehling, J.6
Pearson, J.V.7
Stephan, D.A.8
Nelson, S.F.9
Craig, D.W.10
-
22
-
-
77954711591
-
Towards an axiomatization of statistical privacy and utility
-
ACM Press, New York
-
thACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (Indianapolis, IN, June 6-11). ACM Press, New York, 2010, 147-158.
-
(2010)
th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (Indianapolis, IN, June 6-11)
, pp. 147-158
-
-
Kifer, D.1
Lin, B.-R.2
-
24
-
-
79959983519
-
No free lunch in data privacy
-
ACM Press, New York
-
Kifer, D. and Machanavajjhala, A. No free lunch in data privacy. In Proceeding of the ACM SIGMOD/PODS International Conference on Management of Data (Athens, Greece, June 12-16). ACM Press, New York, 2011, 193-204.
-
(2011)
Proceeding of the ACM SIGMOD/PODS International Conference on Management of Data (Athens, Greece, June 12-16)
, pp. 193-204
-
-
Kifer, D.1
Machanavajjhala, A.2
-
25
-
-
84862624687
-
A rigorous and customizable framework for privacy
-
ACM Press, New York
-
stSymposium on Principles of Database Systems (Scottsdale, AZ, May 20-24). ACM Press, New York, 2012, 77-88.
-
(2012)
st Symposium on Principles of Database Systems (Scottsdale, AZ, May 20-24)
, pp. 77-88
-
-
Kifer, D.1
Machanavajjhala, A.2
-
26
-
-
84893284736
-
Pufferfish: A framework for mathematical privacy definitions
-
1 Jan.
-
Kifer, D. and Machanavajjhala, A. Pufferfish: A framework for mathematical privacy definitions. In Transactions on Database Systems 39, 1 (Jan. 2014), 3:1-3:36.
-
(2014)
Transactions on Database Systems 39
, vol.3
, Issue.1-3
, pp. 36
-
-
Kifer, D.1
Machanavajjhala, A.2
-
27
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
ACM Press, New York
-
thInternational World Wide Web Conference (Banff, Alberta, Canada, May 8-12). ACM Press, New York, 2007, 629-638.
-
(2007)
th International World Wide Web Conference (Banff, Alberta, Canada, May 8-12)
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
30
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
ACM Press, New York
-
McSherry, F.D. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of ACM SIGMOD/PODS International Conference on Management of Data (Providence, RI, June 29-July 2). ACM Press, New York, 2009, 19-30.
-
(2009)
Proceedings of ACM SIGMOD/PODS International Conference on Management of Data (Providence, RI, June 29-July 2)
, pp. 19-30
-
-
McSherry, F.D.1
-
31
-
-
84869429647
-
On significance of the least significant bits for differential privacy
-
ACM Press, New York
-
thACM Conference on Computer and Communications Security (Raleigh, NC, Oct. 16-18). ACM Press, New York, 2012, 650-661.
-
(2012)
thACM Conference on Computer and Communications Security (Raleigh, NC, Oct. 16-18)
, pp. 650-661
-
-
Mironov, I.1
-
32
-
-
50249142450
-
Robust deanonymization of large sparse datasets
-
IEEE Computer Society Press, Washington, D.C.
-
Narayanan, A. and Shmatikov, V. Robust deanonymization of large sparse datasets. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (Oakland, CA). IEEE Computer Society Press, Washington, D.C., 2008, 111-125.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy (Oakland, CA)
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
33
-
-
70350635777
-
Relationship privacy: Output perturbation for queries with joins
-
ACM Press, New York
-
thACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems (Providence, RI, June 29-July 2). ACM Press, New York, 2009, 107-116.
-
(2009)
th ACM SIGMOD-SIGACT- SIGART Symposium on Principles of Database Systems (Providence, RI, June 29-July 2)
, pp. 107-116
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
36
-
-
85011016303
-
Minimality attack in privacy-preserving data publishing
-
VLDB Endowment
-
rdInternational Conference on Very Large Data Bases (University of Vienna, Austria, Sept. 23-27). VLDB Endowment, 2007, 543-554.
-
(2007)
rd International Conference on Very Large Data Bases (University of Vienna, Austria, Sept. 23-27)
, pp. 543-554
-
-
Wong, R.1
Fu, A.2
Wang, K.3
Pei, J.4
-
37
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
ACM Press, New York
-
thInternational World Wide Web Conference (Madrid, Spain, Apr. 20-24). ACM Press, New York, 2009, 531-540.
-
(2009)
th International World Wide Web Conference (Madrid, Spain, Apr. 20-24)
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
|