-
1
-
-
84942309686
-
-
ACM Comput. Surv., vol. 42, no. 4, pp. 1-53
-
B. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: A survey of recent developments, " ACM Comput. Surv., vol. 42, no. 4, pp. 1-53, 2010
-
(2010)
Privacy-preserving Data Publishing: A Survey of Recent Developments
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining, " SIGMOD Rec., vol. 29, no. 2, pp. 439-450, 2000
-
(2000)
SIGMOD Rec
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
0036811143
-
Achieving k-Anonymity privacy protection using generalization and suppression
-
L. Sweeney. Achieving k-Anonymity privacy protection using generalization and suppression, " Int. J. Uncertainty, Fuzziness, Knowl.-Based Syst., vol. 10, no. 05, pp. 571-588, 2002
-
(2002)
Int. J. Uncertainty, Fuzziness, Knowl.-Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
4
-
-
33749607006
-
L-diversity: Privacy beyond k-Anonymity
-
Apr
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-Anonymity, " in Proc. 22nd Int. Conf. Data Eng. (ICDE'06), Apr. 2006, pp. 24-24
-
(2006)
Proc. 22nd Int. Conf. Data Eng. (ICDE'06
, pp. 24-24
-
-
MacHanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
5
-
-
34548805858
-
T-closeness: Privacy beyond k-Anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. T-closeness: Privacy beyond k-Anonymity and l-diversity, " in Proc. ICDE, 2007, vol. 7, pp. 106-115
-
(2007)
Proc. ICDE
, vol.7
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
7
-
-
85019757056
-
Privacy-preserving data mining techniques: Survey and challenges
-
New York, NY, USA: Springer
-
S. Matwin. Privacy-preserving data mining techniques: Survey and challenges, " in Discrimination and Privacy in the Information Society. New York, NY, USA: Springer, 2013, pp. 209-221
-
(2013)
Discrimination and Privacy in the Information Society
, pp. 209-221
-
-
Matwin, S.1
-
9
-
-
84875627441
-
Buying private data at auction: The sensitive surveyor's problem
-
A. Roth. Buying private data at auction: The sensitive surveyor's problem. SIGecom Exchanges, vol. 11, no. 1, pp. 1-8, 2012
-
(2012)
SIGecom Exchanges
, vol.11
, Issue.1
, pp. 1-8
-
-
Roth, A.1
-
11
-
-
84863535268
-
Approximately optimal auctions for selling privacy when costs are correlated with data
-
L. K. Fleischer and Y.-H. Lyu. Approximately optimal auctions for selling privacy when costs are correlated with data, " in Proc. 13th ACM Conf. Electron. Commerce ACM, 2012, pp. 568-585
-
(2012)
Proc. 13th ACM Conf. Electron. Commerce ACM
, pp. 568-585
-
-
Fleischer, L.K.1
Lyu, Y.-H.2
-
12
-
-
84871390246
-
Take it or leave it: Running a survey when privacy comes at a cost
-
New York, NY, USA: Springer, 2012
-
K. Ligett and A. Roth. Take it or leave it: Running a survey when privacy comes at a cost, " in Internet and Network Economics. New York, NY, USA: Springer, 2012, pp. 378-391
-
Internet and Network Economics
, pp. 378-391
-
-
Ligett, K.1
Roth, A.2
-
16
-
-
84876067685
-
Optimal contract design for ancillary services in vehicle-to-grid networks
-
SmartGridComm), Nov
-
Y. Gao, Y. Chen, C.-Y. Wang, and K. J. R. Liu. Optimal contract design for ancillary services in vehicle-to-grid networks, " in Proc. IEEE 3rd Int. Conf. Smart Grid Commun. (SmartGridComm), Nov. 2012, pp. 79-84
-
(2012)
Proc IEEE 3rd Int. Conf. Smart Grid Commun
, pp. 79-84
-
-
Gao, Y.1
Chen, Y.2
Wang, C.-Y.3
Liu, K.J.R.4
-
17
-
-
84883059905
-
A contract-based approach for ancillary services in v2g networks: Optimality and learning
-
Y. Gao, Y. Chen, C.-Y. Wang, and K. J. R. Liu. A contract-based approach for ancillary services in v2g networks: Optimality and learning, " in Proc. IEEE INFOCOM, Apr. 2013, pp. 1151-1159
-
(2013)
Proc IEEE INFOCOM, Apr.
, pp. 1151-1159
-
-
Gao, Y.1
Chen, Y.2
Wang, C.-Y.3
Liu, J.K.R.4
-
20
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
New York, NY, USA ser. SIGMOD'05, ACM
-
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-Anonymity, " in Proc. ACM SIGMOD Int. Conf.Manage. Data, New York, NY, USA, 2005, pp. 49-60, ser. SIGMOD'05, ACM
-
(2005)
Proc ACM SIGMOD Int. Conf.Manage. Data
, pp. 49-60
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
21
-
-
84873663513
-
Flash: Efficient, stable and optimal k-anonymity
-
Sep
-
F. Kohlmayer, F. Prasser, C. Eckert, A. Kemper, and K. Kuhn. Flash: Efficient, stable and optimal k-Anonymity, " in Proc. Privacy, Security, Risk and Trust (PASSAT), Int. Conf. and 2012 Int. Conf. Social Comput. (SocialCom), Sep. 2012, pp. 708-717
-
(2012)
Proc. Privacy, Security, Risk and Trust (PASSAT), Int. Conf. and 2012 Int. Conf. Social Comput. (SocialCom)
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.5
|