메뉴 건너뛰기




Volumn 4, Issue , 2016, Pages 2751-2763

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data

Author keywords

Big data; data clustering; differential privacy; privacy

Indexed keywords

CLUSTER ANALYSIS; CLUSTERING ALGORITHMS; DATA PRIVACY;

EID: 84979812487     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2016.2577036     Document Type: Article
Times cited : (277)

References (86)
  • 1
    • 79951498486 scopus 로고    scopus 로고
    • Climate data challenges in the 21st century
    • J. T. Overpeck, G. A. Meehl, S. Bony, and D. R. Easterling, "Climate data challenges in the 21st century," Science, vol. 331, no. 6018, pp. 700-702, 2011.
    • (2011) Science , vol.331 , Issue.6018 , pp. 700-702
    • Overpeck, J.T.1    Meehl, G.A.2    Bony, S.3    Easterling, D.R.4
  • 2
    • 84878979335 scopus 로고    scopus 로고
    • Biology: The big challenges of big data
    • V. Marx, "Biology: The big challenges of big data," Nature, vol. 498, no. 7453, pp. 255-260, 2013.
    • (2013) Nature , vol.498 , Issue.7453 , pp. 255-260
    • Marx, V.1
  • 3
    • 79951487253 scopus 로고    scopus 로고
    • Advancing global health research through digital technology and sharing data
    • L. Lang, "Advancing global health research through digital technology and sharing data," Science, vol. 331, no. 6018, pp. 714-717, 2011.
    • (2011) Science , vol.331 , Issue.6018 , pp. 714-717
    • Lang, L.1
  • 4
    • 79951493626 scopus 로고    scopus 로고
    • Ensuring the data-rich future of the social sciences
    • G. King, "Ensuring the data-rich future of the social sciences," Science, vol. 331, no. 6018, pp. 719-721, 2011.
    • (2011) Science , vol.331 , Issue.6018 , pp. 719-721
    • King, G.1
  • 6
    • 84875822474 scopus 로고    scopus 로고
    • Unique in the crowd: The privacy bounds of human mobility
    • Mar
    • Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the crowd: The privacy bounds of human mobility," Sci. Rep., vol. 3, Mar. 2013, Art. no. 1376.
    • (2013) Sci. Rep , vol.3
    • De Montjoye, Y.-A.1    Hidalgo, C.A.2    Verleysen, M.3    Blondel, V.D.4
  • 7
    • 84921917628 scopus 로고    scopus 로고
    • Unique in the shopping mall: On the reidentifiability of credit card metadata
    • Y.-A. de Montjoye, L. Radaelli, V. K. Singh, and A. Pentland, "Unique in the shopping mall: On the reidentifiability of credit card metadata," Science, vol. 347, no. 6221, pp. 536-539, 2015.
    • (2015) Science , vol.347 , Issue.6221 , pp. 536-539
    • De Montjoye, Y.-A.1    Radaelli, L.2    Singh, V.K.3    Pentland, A.4
  • 8
    • 84937801713 scopus 로고    scopus 로고
    • Machine learning: Trends, perspectives, and prospects
    • M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," Science, vol. 349, no. 6245, pp. 255-260, 2015.
    • (2015) Science , vol.349 , Issue.6245 , pp. 255-260
    • Jordan, M.I.1    Mitchell, T.M.2
  • 9
    • 10044273842 scopus 로고    scopus 로고
    • Tools for privacy preserving distributed data mining
    • C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explo- rations Newslett., vol. 4, no. 2, pp. 28-34, 2002. [Online]. Available: http://doi.acm.org/10.1145/772862.772867
    • (2002) SIGKDD Explo- Rations Newslett , vol.4 , Issue.2 , pp. 28-34
    • Clifton, C.1    Kantarcioglu, M.2    Vaidya, J.3    Lin, X.4    Zhu, M.Y.5
  • 10
  • 11
    • 77951201056 scopus 로고    scopus 로고
    • Privacy-preserving data publishing: A survey of recent developments
    • B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, 2010, Art. no. 14.
    • (2010) ACM Comput. Surv , vol.42 , Issue.4
    • Fung, B.C.M.1    Wang, K.2    Chen, R.3    Yu, P.S.4
  • 12
    • 84863959740 scopus 로고    scopus 로고
    • Predicted packet padding for anonymous Web browsing against trafć analysis attacks
    • Aug
    • S. Yu, G. Zhao, W. Dou, and S. James, "Predicted packet padding for anonymous Web browsing against trafć analysis attacks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1381-1393, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1381-1393
    • Yu, S.1    Zhao, G.2    Dou, W.3    James, S.4
  • 13
    • 84899651651 scopus 로고    scopus 로고
    • IdentiDroid: Android can finally wear its anonymous suit
    • B. Shebaro, O. Oluwatimi, D. Midi, and E. Bertino, "IdentiDroid: Android can finally wear its anonymous suit," Trans. Data Privacy, vol. 7, no. 1, pp. 27-50, 2014. [Online]. Available: http://www.tdp.cat/ issues11/abs.a150a13.php
    • (2014) Trans. Data Privacy , vol.7 , Issue.1 , pp. 27-50
    • Shebaro, B.1    Oluwatimi, O.2    Midi, D.3    Bertino, E.4
  • 14
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
    • (1949) Bell Labs Tech. J , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 16
    • 77955872093 scopus 로고    scopus 로고
    • On anonymity in an electronic society: A survey of anonymous communication systems
    • M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Comput. Surv., vol. 42, no. 1, 2009, Art. no. 5.
    • (2009) ACM Comput. Surv , vol.42 , Issue.1
    • Edman, M.1    Yener, B.2
  • 17
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network trafć
    • Dec
    • C. V. Wright, F. Monrose, and G. M. Masson, "On inferring application protocol behaviors in encrypted network trafć," J. Mach. Learn. Res., vol. 7, pp. 2745-2769, Dec. 2006.
    • (2006) J. Mach. Learn. Res , vol.7 , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3
  • 18
    • 80755134983 scopus 로고    scopus 로고
    • Traffic morphing: An efficient defense against statistical trafć analysis
    • C. V. Wright, S. E. Coull, and F. Monrose, "Traffic morphing: An efficient defense against statistical trafć analysis," in Proc. NDSS, 2009, pp. 1-14.
    • (2009) Proc. NDSS , pp. 1-14
    • Wright, C.V.1    Coull, S.E.2    Monrose, F.3
  • 21
    • 0002054934 scopus 로고    scopus 로고
    • Crowds: Anonymity forWeb transactions
    • M. K. Reiter and A. D. Rubin, "Crowds: Anonymity forWeb transactions," ACM Trans. Inf. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.
    • (1998) ACM Trans. Inf. Syst. Secur , vol.1 , Issue.1 , pp. 66-92
    • Reiter, M.K.1    Rubin, A.D.2
  • 22
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," in Proc. IEEE Symp. Res. Secur. Privacy (S&P), May 1998, pp. 1-19.
    • (1998) Proc. IEEE Symp. Res. Secur. Privacy (S&P), May , pp. 1-19
    • Samarati, P.1    Sweeney, L.2
  • 24
    • 77952913726 scopus 로고    scopus 로고
    • Closeness: A new privacy measure for data publishing
    • Jul
    • N. Li, T. Li, and S. Venkatasubramanian, "Closeness: A new privacy measure for data publishing," IEEE Trans. Knowl. Data Eng., vol. 22, no. 7, pp. 943-956, Jul. 2010.
    • (2010) IEEE Trans. Knowl. Data Eng , vol.22 , Issue.7 , pp. 943-956
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 25
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork, "Differential privacy," in Proc. ICALP, 2006, pp. 1-12.
    • (2006) Proc. ICALP , pp. 1-12
    • Dwork, C.1
  • 27
    • 77952555772 scopus 로고    scopus 로고
    • A statistical framework for differential privacy
    • L. Wasserman and S. Zhou, "A statistical framework for differential privacy," J. Amer. Statist. Assoc., vol. 105, no. 489, pp. 375-389, 2010.
    • (2010) J. Amer. Statist. Assoc , vol.105 , Issue.489 , pp. 375-389
    • Wasserman, L.1    Zhou, S.2
  • 30
    • 84940878770 scopus 로고    scopus 로고
    • Conservative or liberal? Personalized differential privacy
    • Seoul, South Korea, Apr
    • Z. Jorgensen, T. Yu, and G. Cormode, "Conservative or liberal? Personalized differential privacy," in Proc. 31st IEEE Int. Conf. Data Eng. (ICDE), Seoul, South Korea, Apr. 2015, pp. 1023-1034.
    • (2015) Proc. 31st IEEE Int. Conf. Data Eng. (ICDE) , pp. 1023-1034
    • Jorgensen, Z.1    Yu, T.2    Cormode, G.3
  • 31
    • 84893263337 scopus 로고    scopus 로고
    • Privacy and mechanism design
    • M. M. Pai and A. Roth, "Privacy and mechanism design," ACM SIGecom Exchanges, vol. 12, no. 1, pp. 8-29, 2013.
    • (2013) ACM SIGecom Exchanges , vol.12 , Issue.1 , pp. 8-29
    • Pai, M.M.1    Roth, A.2
  • 32
    • 84921930898 scopus 로고    scopus 로고
    • What the rìght to be forgotten' means for privacy in a digital age
    • A. L. Newman, "What the rìght to be forgotten' means for privacy in a digital age," Science, vol. 347, no. 6221, pp. 507-508, 2015.
    • (2015) Science , vol.347 , Issue.6221 , pp. 507-508
    • Newman, A.L.1
  • 33
    • 33745785112 scopus 로고    scopus 로고
    • Towards a privacy measurement criterion for voting systems
    • Atlanta, GA, USA, May
    • L. Coney, J. L. Hall, P. L. Vora, and D. Wagner, "Towards a privacy measurement criterion for voting systems," in Proc. Nat. Conf. Digit. Government Res., Atlanta, GA, USA, May 2005, pp. 287-288.
    • (2005) Proc. Nat. Conf. Digit. Government Res , pp. 287-288
    • Coney, L.1    Hall, J.L.2    Vora, P.L.3    Wagner, D.4
  • 36
    • 0035517699 scopus 로고    scopus 로고
    • Protecting respondents' identities in microdata release
    • Nov
    • P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. Knowl. Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001.
    • (2001) IEEE Trans. Knowl. Data Eng , vol.13 , Issue.6 , pp. 1010-1027
    • Samarati, P.1
  • 37
  • 39
    • 84883072323 scopus 로고    scopus 로고
    • Truthful incentive mechanisms for k-anonymity location privacy
    • Turin, Italy, Apr
    • D. Yang, X. Fang, and G. Xue, "Truthful incentive mechanisms for k-anonymity location privacy," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2994-3002.
    • (2013) Proc. IEEE INFOCOM , pp. 2994-3002
    • Yang, D.1    Fang, X.2    Xue, G.3
  • 40
    • 84883091913 scopus 로고    scopus 로고
    • A game-theoretic approach for achieving k-anonymity in location based services
    • Turin, Italy, Apr
    • X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, "A game-theoretic approach for achieving k-anonymity in location based services," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2985-2993.
    • (2013) Proc. IEEE INFOCOM , pp. 2985-2993
    • Liu, X.1    Liu, K.2    Guo, L.3    Li, X.4    Fang, Y.5
  • 41
    • 77956995886 scopus 로고    scopus 로고
    • From t-closeness-like privacy to postrandomization via information theory
    • Nov
    • D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer, "From t-closeness-like privacy to postrandomization via information theory," IEEE Trans. Knowl. Data Eng., vol. 22, no. 11, pp. 1623-1636, Nov. 2010.
    • (2010) IEEE Trans. Knowl. Data Eng , vol.22 , Issue.11 , pp. 1623-1636
    • Rebollo-Monedero, D.1    Forné, J.2    Domingo-Ferrer, J.3
  • 42
    • 84979840335 scopus 로고    scopus 로고
    • Heterogeneous differential privacy
    • M. Alaggan, S. Gambs, and A. Kermarrec, "Heterogeneous differential privacy," CoRR, 2015. [Online]. Available: http://arxiv.org/ abs/1504.06998
    • (2015) CoRR
    • Alaggan, M.1    Gambs, S.2    Kermarrec, A.3
  • 43
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • Alexandria, VA, USA, Oct./Nov
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th ACMConf. Comput. Commun. Secur. (CCS), Alexandria, VA, USA, Oct./Nov. 2006, pp. 89-98.
    • (2006) Proc. 13th ACMConf. Comput. Commun. Secur. (CCS) , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 46
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • Berkeley, CA, USA, May
    • D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, May 2000, pp. 44-55.
    • (2000) Proc. IEEE Symp. Secur. Privacy , pp. 44-55
    • Song, D.X.1    Wagner, D.2    Perrig, A.3
  • 47
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • Alexandria, VA, USA, Oct./Nov
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved de-nitions and efficient constructions," in Proc. 13th ACMConf. Comput. Commun. Secur. (CCS), Alexandria, VA, USA, Oct./Nov. 2006, pp. 79-88.
    • (2006) Proc. 13th ACMConf. Comput. Commun. Secur. (CCS) , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 49
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • Bethesda, MD, USA, May/Jun
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., Bethesda, MD, USA, May/Jun. 2009, pp. 169-178.
    • (2009) Proc. 41st Annu. ACM Symp. Theory Comput , pp. 169-178
    • Gentry, C.1
  • 50
    • 84863310390 scopus 로고    scopus 로고
    • Computing blindfolded: New developments in fully homomorphic encryption
    • Palm Springs, CA, USA Oct
    • V. Vaikuntanathan, "Computing blindfolded: New developments in fully homomorphic encryption," in Proc. IEEE 52nd Annu. Symp. Found. Comput. Sci., Palm Springs, CA, USA, Oct. 2011, pp. 5-16.
    • (2011) Proc. IEEE 52nd Annu. Symp. Found. Comput. Sci , pp. 5-16
    • Vaikuntanathan, V.1
  • 53
    • 34547350876 scopus 로고    scopus 로고
    • Inferring the source of encrypted HTTP connections
    • Alexandria, VA, USA, Oct./Nov
    • M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in Proc. 13th ACM Conf. Comput. Commun. Secur., Alexandria, VA, USA, Oct./Nov. 2006, pp. 255-263.
    • (2006) Proc. 13th ACM Conf. Comput. Commun. Secur , pp. 255-263
    • Liberatore, M.1    Levine, B.N.2
  • 54
    • 77953123409 scopus 로고    scopus 로고
    • Correlation-based trafć analysis attacks on anonymity networks
    • Jul
    • Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "Correlation-based trafć analysis attacks on anonymity networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 954-967, Jul. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst , vol.21 , Issue.7 , pp. 954-967
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5
  • 55
    • 45249083605 scopus 로고    scopus 로고
    • Anonymous networking amidst eavesdroppers
    • Jun
    • P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2770-2784, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2770-2784
    • Venkitasubramaniam, P.1    He, T.2    Tong, L.3
  • 56
    • 84923317932 scopus 로고    scopus 로고
    • Information security in big data: Privacy and data mining
    • Oct
    • L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
    • (2014) IEEE Access , vol.2 , pp. 1149-1176
    • Xu, L.1    Jiang, C.2    Wang, J.3    Yuan, J.4    Ren, Y.5
  • 57
    • 84920857531 scopus 로고    scopus 로고
    • Correlated differential privacy: Hiding information in non-IID data set
    • Feb
    • T. Zhu, P. Xiong, G. Li, and W. Zhou, "Correlated differential privacy: Hiding information in non-IID data set," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 229-242, Feb. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.2 , pp. 229-242
    • Zhu, T.1    Xiong, P.2    Li, G.3    Zhou, W.4
  • 58
    • 85032751316 scopus 로고    scopus 로고
    • Privacy-preserving biometric identićation using secure multiparty computation: An overview and recent trends
    • Mar
    • J. Bringer, H. Chabanne, and A. Patey, "Privacy-preserving biometric identićation using secure multiparty computation: An overview and recent trends," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 42-52, Mar. 2013.
    • (2013) IEEE Signal Process. Mag , vol.30 , Issue.2 , pp. 42-52
    • Bringer, J.1    Chabanne, H.2    Patey, A.3
  • 59
    • 85032751180 scopus 로고    scopus 로고
    • Privacy protection in biometricbased recognition systems: A marriage between cryptography and signal processing
    • Sep
    • M. Barni, G. Droandi, and R. Lazzeretti, "Privacy protection in biometricbased recognition systems: A marriage between cryptography and signal processing," IEEE Signal Process. Mag., vol. 32, no. 5, pp. 66-76, Sep. 2015.
    • (2015) IEEE Signal Process. Mag , vol.32 , Issue.5 , pp. 66-76
    • Barni, M.1    Droandi, G.2    Lazzeretti, R.3
  • 60
    • 79951830125 scopus 로고    scopus 로고
    • Privacy-security trade-offs in biometric security systems-Part I: Single use case
    • Jan
    • L. Lai, S. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems-Part I: Single use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 122-139, Jan. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 122-139
    • Lai, L.1    Ho, S.2    Poor, H.V.3
  • 61
    • 79951822559 scopus 로고    scopus 로고
    • Privacy-security trade-offs in biometric security systems-Part II: Multiple use case
    • Jan
    • L. Lai, S. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems-Part II: Multiple use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 140-151, Jan. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.1 , pp. 140-151
    • Lai, L.1    Ho, S.2    Poor, H.V.3
  • 62
    • 84959386530 scopus 로고    scopus 로고
    • Fundamental limits for privacypreserving biometric identićation systems that support authentication
    • Oct
    • T. Ignatenko and F. M. J. Willems, "Fundamental limits for privacypreserving biometric identićation systems that support authentication," IEEE Trans. Inf. Theory, vol. 61, no. 10, pp. 5583-5594, Oct. 2015.
    • (2015) IEEE Trans. Inf. Theory , vol.61 , Issue.10 , pp. 5583-5594
    • Ignatenko, T.1    Willems, F.M.J.2
  • 63
    • 84997149426 scopus 로고    scopus 로고
    • What else does your biometric data reveal? A survey on soft biometrics
    • Mar
    • A. Dantcheva, P. Elia, and A. Ross, "What else does your biometric data reveal? A survey on soft biometrics," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 441-467, Mar. 2016.
    • (2016) IEEE Trans. Inf. Forensics Security , vol.11 , Issue.3 , pp. 441-467
    • Dantcheva, A.1    Elia, P.2    Ross, A.3
  • 64
    • 33745604236 scopus 로고    scopus 로고
    • Stable signal recovery from incomplete and inaccurate measurements
    • E. J. Candés, J. K. Romberg, and T. Tao, "Stable signal recovery from incomplete and inaccurate measurements," Commun. Pure Appl. Math., vol. 59, no. 8, pp. 1207-1223, 2006.
    • (2006) Commun. Pure Appl. Math , vol.59 , Issue.8 , pp. 1207-1223
    • Candés, E.J.1    Romberg, J.K.2    Tao, T.3
  • 65
    • 33645712892 scopus 로고    scopus 로고
    • Compressed sensing
    • Apr
    • D. L. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.4 , pp. 1289-1306
    • Donoho, D.L.1
  • 68
    • 84899565101 scopus 로고    scopus 로고
    • A tutorial on interactive sensing in social networks
    • Mar
    • V. Krishnamurthy and H. V. Poor, "A tutorial on interactive sensing in social networks," IEEE Trans. Comput. Social Syst., vol. 1, no. 1, pp. 3-21, Mar. 2014.
    • (2014) IEEE Trans. Comput. Social Syst , vol.1 , Issue.1 , pp. 3-21
    • Krishnamurthy, V.1    Poor, H.V.2
  • 71
    • 84863535268 scopus 로고    scopus 로고
    • Approximately optimal auctions for selling privacy when costs are correlated with data
    • Valencia, Spain, Jun
    • L. Fleischer and Y. Lyu, "Approximately optimal auctions for selling privacy when costs are correlated with data," in Proc. ACM Conf. Electron. Commerce, Valencia, Spain, Jun. 2012, pp. 568-585.
    • (2012) Proc. ACM Conf. Electron. Commerce , pp. 568-585
    • Fleischer, L.1    Lyu, Y.2
  • 72
    • 84871390246 scopus 로고    scopus 로고
    • Take it or leave it: Running a survey when privacy comes at a cost
    • Liverpool, U.K., Dec
    • K. Ligett and A. Roth, "Take it or leave it: Running a survey when privacy comes at a cost," in Proc. 8th Int. Workshop Internet Netw. Econ., Liverpool, U.K., Dec. 2012, pp. 378-391.
    • (2012) Proc. 8th Int. Workshop Internet Netw. Econ , pp. 378-391
    • Ligett, K.1    Roth, A.2
  • 73
    • 84942327005 scopus 로고    scopus 로고
    • Privacy or utility in data collection? A contract theoretic approach
    • Oct
    • L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, "Privacy or utility in data collection? A contract theoretic approach," J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1256-1269, Oct. 2015.
    • (2015) J. Sel. Topics Signal Process , vol.9 , Issue.7 , pp. 1256-1269
    • Xu, L.1    Jiang, C.2    Chen, Y.3    Ren, Y.4    Liu, K.J.R.5
  • 74
    • 84921898213 scopus 로고    scopus 로고
    • Privacy and human behavior in the age of information
    • A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information," Science, vol. 347, no. 6221, pp. 509-514, 2015.
    • (2015) Science , vol.347 , Issue.6221 , pp. 509-514
    • Acquisti, A.1    Brandimarte, L.2    Loewenstein, G.3
  • 75
    • 84937773817 scopus 로고    scopus 로고
    • Data, privacy, and the greater good
    • E. Horvitz and D. Mulligan, "Data, privacy, and the greater good," Science, vol. 349, no. 6245, pp. 253-255, 2015.
    • (2015) Science , vol.349 , Issue.6245 , pp. 253-255
    • Horvitz, E.1    Mulligan, D.2
  • 79
    • 72849125444 scopus 로고    scopus 로고
    • Discriminating DDoS flows from flash crowds using information distance
    • Gold Coast, QLD, Australia, Oct
    • S. Yu, T. Thapngam, J. Liu, S. Wei, and W. Zhou, "Discriminating DDoS flows from flash crowds using information distance," in Proc. 3rd Int. Conf. Netw. Syst. Secur., Gold Coast, QLD, Australia, Oct. 2009, pp. 351-356.
    • (2009) Proc. 3rd Int. Conf. Netw. Syst. Secur , pp. 351-356
    • Yu, S.1    Thapngam, T.2    Liu, J.3    Wei, S.4    Zhou, W.5
  • 80
    • 36249029853 scopus 로고    scopus 로고
    • Correntropy: Properties and applications in non-Gaussian signal processing
    • Nov
    • W. Liu, P. P. Pokharel, and J. C. Principe, "Correntropy: Properties and applications in non-Gaussian signal processing," IEEE Trans. Signal Process., vol. 55, no. 11, pp. 5286-5298, Nov. 2007.
    • (2007) IEEE Trans. Signal Process , vol.55 , Issue.11 , pp. 5286-5298
    • Liu, W.1    Pokharel, P.P.2    Principe, J.C.3
  • 82
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • Providence, RI, USA, Jun./Jul
    • F. McSherry, "Privacy integrated queries: An extensible platform for privacy-preserving data analysis," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Providence, RI, USA, Jun./Jul. 2009, pp. 19-30.
    • (2009) Proc. ACM SIGMOD Int. Conf. Manage. Data , pp. 19-30
    • McSherry, F.1
  • 84
    • 0033604507 scopus 로고    scopus 로고
    • Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations
    • D. Gottesman and I. L. Chuang, "Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations," Nature, vol. 402, no. 6760, pp. 390-393, 1999.
    • (1999) Nature , vol.402 , Issue.6760 , pp. 390-393
    • Gottesman, D.1    Chuang, I.L.2
  • 86
    • 84979793202 scopus 로고    scopus 로고
    • accessed on May 17
    • Advances in Computational Psychophysiology, accessed on May 17, 2016. [Online]. Available: http://www.sciencemag.org/custompublishing/ collections/advances-computational-psychophysiology
    • (2016) Advances in Computational Psychophysiology


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.