-
3
-
-
84864193640
-
Secure distributed framework for achieving-differential privacy
-
D. Alhadidi, N. Mohammed, B. C. M. Fung, and M. Debbabi, "Secure distributed framework for achieving-differential privacy," in Proc. 12th Priv. Enhancing Technol. Symp., 2012, pp. 120-139.
-
(2012)
Proc. 12th Priv. Enhancing Technol. Symp.
, pp. 120-139
-
-
Alhadidi, D.1
Mohammed, N.2
Fung, B.C.M.3
Debbabi, M.4
-
4
-
-
34250017239
-
A face is exposed for aol searcher 4417749
-
Aug.
-
M. Barbaro and T. Zeller Jr, "A face is exposed for aol searcher no. 4417749," New York Times, Aug. 2006, http://www.nytimes. com/2006/08/09/technology/09aol.htmlpagewanted=all&r=0
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
5
-
-
55149118992
-
A survey of query log privacy-enhancing techniques from a policy perspective
-
A. Cooper, "A survey of query log privacy-enhancing techniques from a policy perspective," ACM Trans. Web, vol. 2, no. 4, pp. 191-1927, 2008.
-
(2008)
ACM Trans. Web
, vol.2
, Issue.4
, pp. 191-1927
-
-
Cooper, A.1
-
6
-
-
72449122369
-
Entropy-biased models for query representation on the click graph
-
H. Deng, I. King, and M. R. Lyu, "Entropy-biased models for query representation on the click graph," in Proc. 32nd Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2009, pp. 339-346.
-
(2009)
Proc. 32nd Int ACM SIGIR Conf. Res. Develop. Inform. Retrieval
, pp. 339-346
-
-
Deng, H.1
King, I.2
Lyu, M.R.3
-
8
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd Conf. Theory Cryptography, 2006, pp. 265-284.
-
(2006)
Proc. 3rd Conf. Theory Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
9
-
-
80052126716
-
Crowdlogging: Distributed, private, and anonymous search logging
-
H. A. Feild, J. Allan, and J. Glatt, "Crowdlogging: Distributed, private, and anonymous search logging," in Proc. 34th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2011, pp. 375-384.
-
(2011)
Proc. 34th Int ACM SIGIR Conf. Res. Develop. Inform. Retrieval
, pp. 375-384
-
-
Feild, H.A.1
Allan, J.2
Glatt, J.3
-
10
-
-
60549098239
-
Detecting influenza epidemics using search engine query data
-
Feb.
-
J. Ginsberg, M. H.Mohebbi, R. S. Patel, L. Brammer, M. S. Smolinski, and Larry Brilliant, "Detecting influenza epidemics using search engine query data," Nature, vol. 457, pp. 1012-1014, Feb. 2009.
-
(2009)
Nature
, vol.457
, pp. 1012-1014
-
-
Ginsberg, J.1
Mohebbi, M.H.2
Patel, R.S.3
Brammer, L.4
Smolinski, M.S.5
Brilliant, L.6
-
11
-
-
26444553177
-
Encryption schemes
-
Cambridge, U.K.: Cambridge Univ. Press
-
O. Goldreich, "Encryption schemes," in The Foundations of Cryptography, vol. 2. Cambridge, U.K.: Cambridge Univ. Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
12
-
-
84936761677
-
M-privacy for collaborative data publishing
-
S. Goryczka, L. Xiong, and B. C. M. Fung, "m-privacy for collaborative data publishing," in Proc. 7th Int. Conf. Collaborative Comput.: Netw., Appl. Worksharing, 2011, pp. 1-10.
-
(2011)
Proc. 7th Int. Conf. Collaborative Comput.: Netw., Appl. Worksharing
, pp. 1-10
-
-
Goryczka, S.1
Xiong, L.2
Fung, B.C.M.3
-
13
-
-
84863012396
-
Publishing search logs -A comparative study of privacy guarantees
-
Mar.
-
M. Gotz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke, "Publishing search logs-a comparative study of privacy guarantees," IEEE Trans. Knowl. Data Eng., vol. 24, no. 3, pp. 520-532, Mar. 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.3
, pp. 520-532
-
-
Gotz, M.1
MacHanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
14
-
-
65449131477
-
Researchers yearn to use aol logs, but they hesitate
-
Aug.
-
K. Hafner, "Researchers yearn to use aol logs, but they hesitate," New York Times, Aug. 2006, http://www.nytimes.com/2006/08/23/technology/23search.htmlpagewanted=all
-
(2006)
New York Times
-
-
Hafner, K.1
-
16
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
M. Hay, C. Li, G. Miklau, and D. Jensen, "Accurate estimation of the degree distribution of private networks," in Proc. 9th IEEE Int. Conf. Data Mining, 2009, pp. 169-178.
-
(2009)
Proc. 9th IEEE Int. Conf. Data Mining
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
17
-
-
78049372159
-
Anonymization of set-valued data via top-down, local generalization
-
Y. He and J. F. Naughton, "Anonymization of set-valued data via top-down, local generalization," Proc. VLDB Endowment, vol. 2, no. 1, pp. 934-945, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 934-945
-
-
He, Y.1
Naughton, J.F.2
-
18
-
-
79960248419
-
Efficient Distributed Linear Programming with Limited Disclosure
-
Y. Hong, J. Vaidya, and H. Lu, "Efficient Distributed Linear Programming with Limited Disclosure," in Proc. 25th Annu. IFIP WG 11.3 Conf. Data Appl. Security Privacy, 2011, pp. 170-185.
-
(2011)
Proc. 25th Annu. IFIP WG 11.3 Conf. Data Appl. Security Privacy
, pp. 170-185
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
19
-
-
84872255959
-
Secure and efficient distributed linear programming
-
Y. Hong, J. Vaidya, and H. Lu, "Secure and efficient distributed linear programming," J. Comput. Secur., vol. 20, no. 5, pp. 583-634, 2012.
-
(2012)
J. Comput. Secur.
, vol.20
, Issue.5
, pp. 583-634
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
20
-
-
36048997303
-
A secure distributed framework for achieving k-anonymity
-
W. Jiang and C. Clifton, "A secure distributed framework for achieving k-anonymity," VLDB J., vol. 15, no. 4, pp. 316-333, 2006.
-
(2006)
VLDB J.
, vol.15
, Issue.4
, pp. 316-333
-
-
Jiang, W.1
Clifton, C.2
-
22
-
-
63449090629
-
I know what you did last summer": Query logs and user privacy
-
R. Jones, R. Kumar, B. Pang, and A. Tomkins, "I know what you did last summer": Query logs and user privacy," in Proc. 16th ACM Conf. Inform. Knowl. Manage., 2007, pp. 909-914.
-
(2007)
Proc. 16th ACM Conf. Inform. Knowl. Manage.
, pp. 909-914
-
-
Jones, R.1
Kumar, R.2
Pang, B.3
Tomkins, A.4
-
23
-
-
84885642084
-
Privacy via the johnson-lindenstrauss transform
-
K. Kenthapadi, A. Korolova, I. Mironov, and N. Mishra, "Privacy via the johnson-lindenstrauss transform," J. Privacy Confidentiality, vol. 5, no. 1, pp. 39-71, 2013.
-
(2013)
J. Privacy Confidentiality
, vol.5
, Issue.1
, pp. 39-71
-
-
Kenthapadi, K.1
Korolova, A.2
Mironov, I.3
Mishra, N.4
-
24
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, "Releasing search queries and clicks privately," in Proc. 18th Int. Conf. World Wide Web, 2009, pp. 171-180.
-
(2009)
Proc. 18th Int. Conf. World Wide Web
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
25
-
-
74549172518
-
Effective anonymization of query logs
-
Y. Hong, X. He, J. Vaidya, N. R. Adam, and V. Atluri, "Effective anonymization of query logs," in Proc. 18th ACM Conf. Inform. Knowl. Manage., 2009, pp. 1465-1468.
-
(2009)
Proc. 18th ACM Conf. Inform. Knowl. Manage.
, pp. 1465-1468
-
-
Hong, Y.1
He, X.2
Vaidya, J.3
Adam, N.R.4
Atluri, V.5
-
26
-
-
84863503836
-
Differentially private search log sanitization with optimal output utility
-
Y. Hong, J. Vaidya, H. Lu, and M. Wu, "Differentially private search log sanitization with optimal output utility," in Proc. 15th Int. Conf. Extending Database Technol., 2012, pp. 50-61.
-
(2012)
Proc. 15th Int. Conf. Extending Database Technol.
, pp. 50-61
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Wu, M.4
-
27
-
-
35348838459
-
On anonymizing query logs via token-based hashing
-
R. Kumar, J. Novak, B. Pang, and A. Tomkins, "On anonymizing query logs via token-based hashing," in Proc. 16th Int. Conf. World Wide Web, 2007, pp. 629-638.
-
(2007)
Proc. 16th Int. Conf. World Wide Web
, pp. 629-638
-
-
Kumar, R.1
Novak, J.2
Pang, B.3
Tomkins, A.4
-
28
-
-
84871996662
-
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
-
N. Li, W. Qardaji, and D. Su, "On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy," in Proc. 7th ACM Symp. Inform., Comput. Commun. Security, 2012, pp. 32-33.
-
(2012)
Proc. 7th ACM Symp. Inform., Comput. Commun. Security
, pp. 32-33
-
-
Li, N.1
Qardaji, W.2
Su, D.3
-
29
-
-
84872266260
-
Privacy-preserving horizontally partitioned linear programs with inequality constraints
-
W. Li, H. Li, and C. Deng, "Privacy-preserving horizontally partitioned linear programs with inequality constraints," Optim. Lett., vol. 7, no. 1, pp. 137-144, 2013.
-
(2013)
Optim. Lett.
, vol.7
, Issue.1
, pp. 137-144
-
-
Li, W.1
Li, H.2
Deng, C.3
-
30
-
-
79951740865
-
Enforcing vocabulary k-anonymity by semantic similarity based clustering
-
J. Liu and K. Wang, "Enforcing vocabulary k-anonymity by semantic similarity based clustering," in Proc. IEEE Int. Conf. Data Mining, 2010, pp. 899-904.
-
(2010)
Proc IEEE Int. Conf. Data Mining
, pp. 899-904
-
-
Liu, J.1
Wang, K.2
-
31
-
-
84857650296
-
Privacy-preserving horizontally partitioned linear programs
-
O. L. Mangasarian, "Privacy-preserving horizontally partitioned linear programs," Optim. Lett., vol. 6, no. 3, pp. 431-436, 2012.
-
(2012)
Optim. Lett.
, vol.6
, Issue.3
, pp. 431-436
-
-
Mangasarian, O.L.1
-
33
-
-
79960442271
-
Anonymity meets game theory: Secure data integration with malicious participants
-
N. Mohammed, B. C. M. Fung, and M. Debbabi, "Anonymity meets game theory: secure data integration with malicious participants," VLDB J., vol. 20, no. 4, pp. 567-588, 2011.
-
(2011)
VLDB J.
, vol.20
, Issue.4
, pp. 567-588
-
-
Mohammed, N.1
Fung, B.C.M.2
Debbabi, M.3
-
34
-
-
78149335185
-
Centralized and distributed anonymization for high-dimensional healthcare data
-
N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. K. Lee, "Centralized and distributed anonymization for high-dimensional healthcare data," ACM Trans. Knowl. Discovery Data, vol. 4, no. 4, p. 18, 2010.
-
(2010)
ACM Trans. Knowl. Discovery Data
, vol.4
, Issue.4
, pp. 18
-
-
Mohammed, N.1
Fung, B.C.M.2
Hung, P.C.K.3
Lee, C.K.4
-
36
-
-
35448955271
-
Smooth sensitivity and sampling in private data analysis
-
K. Nissim, S. Raskhodnikova, and A. Smith, "Smooth sensitivity and sampling in private data analysis," in Proc. 39th Annu. ACM Symp. Theory Comput., 2007, pp. 75-84.
-
(2007)
Proc. 39th Annu ACM Symp. Theory Comput.
, pp. 75-84
-
-
Nissim, K.1
Raskhodnikova, S.2
Smith, A.3
-
37
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Tech., 1999, pp. 223-238.
-
(1999)
Proc. Int. Conf. Theory Appl. Cryptographic Tech.
, pp. 223-238
-
-
Paillier, P.1
-
39
-
-
84903191046
-
-
Ph.D. dissertation Management Sci. Info. Syst. Dept., Newark, NJ, Rutgers Univ
-
Y. Hong, "Privacy-preserving collaborative optimization," Ph.D. dissertation, Management Sci. Info. Syst. Dept., Newark, NJ, Rutgers Univ., 2013.
-
(2013)
Privacy-preserving Collaborative Optimization
-
-
Hong, Y.1
-
40
-
-
84958534926
-
Collaboratively solving the traveling salesman problem with limited disclosure
-
Y. Hong, J. Vaidya, H. Lu, and L. Wang, "Collaboratively solving the traveling salesman problem with limited disclosure," in Proc. Conf. Data Appl. Security Privacy, 2014, pp. 179-194.
-
(2014)
Proc. Conf. Data Appl. Security Privacy
, pp. 179-194
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Wang, L.4
-
41
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Jan.
-
S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Trans. Inf. Theory, vol. IT-24, no. 1, pp. 106-110, Jan. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.1
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
42
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
43
-
-
84903184001
-
A survey of privacy-aware supply chain collaboration: From theory to applications
-
Y. Hong, J. Vaidya, and S. Wang, "A survey of privacy-aware supply chain collaboration: From theory to applications," J. Inf. Syst., vol. 28, no. 1, pp. 243-268, 2014.
-
(2014)
J. Inf. Syst.
, vol.28
, Issue.1
, pp. 243-268
-
-
Hong, Y.1
Vaidya, J.2
Wang, S.3
-
44
-
-
84856161025
-
Privacy-preserving Tabu Search for Distributed Graph Coloring
-
Y. Hong, J. Vaidya, H. Lu, and B. Shafiq, "Privacy-preserving Tabu Search for Distributed Graph Coloring," in Proc. IEEE 3rd Int. Conf. Priv., Security, Risk Trust, 2011, pp. 951-958.
-
(2011)
Proc IEEE 3rd Int. Conf. Priv., Security, Risk Trust
, pp. 951-958
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Shafiq, B.4
-
46
-
-
77952787160
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke, "Differential privacy via wavelet transforms," in Proc. 26th IEEE Int. Conf. Data Eng., 2010, pp. 225-236.
-
(2010)
Proc. 26th IEEE Int. Conf. Data Eng.
, pp. 225-236
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
48
-
-
33244463520
-
Privacy-enhancing-anonymization of customer data
-
S. Zhong, Z. Yang, and R. N. Wright, "Privacy-enhancing-anonymization of customer data," in Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles Database Syst., 2005, pp. 139-147.
-
(2005)
Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles Database Syst.
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
|