-
1
-
-
79951498486
-
Climate data challenges in the 21st century
-
J. T. Overpeck, G. A. Meehl, S. Bony, and D. R. Easterling, "Climate data challenges in the 21st century," Science, vol. 331, no. 6018, pp. 700-702, 2011.
-
(2011)
Science
, vol.331
, Issue.6018
, pp. 700-702
-
-
Overpeck, J.T.1
Meehl, G.A.2
Bony, S.3
Easterling, D.R.4
-
2
-
-
84878979335
-
Biology: The big challenges of big data
-
V. Marx, "Biology: The big challenges of big data," Nature, vol. 498, no. 7453, pp. 255-260, 2013.
-
(2013)
Nature
, vol.498
, Issue.7453
, pp. 255-260
-
-
Marx, V.1
-
3
-
-
79951487253
-
Advancing global health research through digital technology and sharing data
-
L. Lang, "Advancing global health research through digital technology and sharing data," Science, vol. 331, no. 6018, pp. 714-717, 2011.
-
(2011)
Science
, vol.331
, Issue.6018
, pp. 714-717
-
-
Lang, L.1
-
4
-
-
79951493626
-
Ensuring the data-rich future of the social sciences
-
G. King, "Ensuring the data-rich future of the social sciences," Science, vol. 331, no. 6018, pp. 719-721, 2011.
-
(2011)
Science
, vol.331
, Issue.6018
, pp. 719-721
-
-
King, G.1
-
5
-
-
84865610293
-
-
Gartner, Stamford, CT, USA, Tech. Rep
-
D. Laney, "3D data management: Controlling data volume, velocity, and variety," Gartner, Stamford, CT, USA, Tech. Rep., 2011.
-
(2011)
3D Data Management: Controlling Data Volume, Velocity, and Variety
-
-
Laney, D.1
-
6
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Mar
-
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the crowd: The privacy bounds of human mobility," Sci. Rep., vol. 3, Mar. 2013, Art. no. 1376.
-
(2013)
Sci. Rep
, vol.3
-
-
De Montjoye, Y.-A.1
Hidalgo, C.A.2
Verleysen, M.3
Blondel, V.D.4
-
7
-
-
84921917628
-
Unique in the shopping mall: On the reidentifiability of credit card metadata
-
Y.-A. de Montjoye, L. Radaelli, V. K. Singh, and A. Pentland, "Unique in the shopping mall: On the reidentifiability of credit card metadata," Science, vol. 347, no. 6221, pp. 536-539, 2015.
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 536-539
-
-
De Montjoye, Y.-A.1
Radaelli, L.2
Singh, V.K.3
Pentland, A.4
-
8
-
-
84937801713
-
Machine learning: Trends, perspectives, and prospects
-
M. I. Jordan and T. M. Mitchell, "Machine learning: Trends, perspectives, and prospects," Science, vol. 349, no. 6245, pp. 255-260, 2015.
-
(2015)
Science
, vol.349
, Issue.6245
, pp. 255-260
-
-
Jordan, M.I.1
Mitchell, T.M.2
-
9
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explo- rations Newslett., vol. 4, no. 2, pp. 28-34, 2002. [Online]. Available: http://doi.acm.org/10.1145/772862.772867
-
(2002)
SIGKDD Explo- Rations Newslett
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
10
-
-
84919772168
-
Privacy aware learning
-
J. C. Duchi, M. I. Jordan, and M. J. Wainwright, "Privacy aware learning," J. ACM, vol. 61, no. 6, 2014, Art. no. 38.
-
(2014)
J. ACM
, vol.61
, Issue.6
-
-
Duchi, J.C.1
Jordan, M.I.2
Wainwright, M.J.3
-
11
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, 2010, Art. no. 14.
-
(2010)
ACM Comput. Surv
, vol.42
, Issue.4
-
-
Fung, B.C.M.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
12
-
-
84863959740
-
Predicted packet padding for anonymous Web browsing against trafć analysis attacks
-
Aug
-
S. Yu, G. Zhao, W. Dou, and S. James, "Predicted packet padding for anonymous Web browsing against trafć analysis attacks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1381-1393, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1381-1393
-
-
Yu, S.1
Zhao, G.2
Dou, W.3
James, S.4
-
13
-
-
84899651651
-
IdentiDroid: Android can finally wear its anonymous suit
-
B. Shebaro, O. Oluwatimi, D. Midi, and E. Bertino, "IdentiDroid: Android can finally wear its anonymous suit," Trans. Data Privacy, vol. 7, no. 1, pp. 27-50, 2014. [Online]. Available: http://www.tdp.cat/ issues11/abs.a150a13.php
-
(2014)
Trans. Data Privacy
, vol.7
, Issue.1
, pp. 27-50
-
-
Shebaro, B.1
Oluwatimi, O.2
Midi, D.3
Bertino, E.4
-
14
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Labs Tech. J., vol. 28, no. 4, pp. 656-715, Oct. 1949.
-
(1949)
Bell Labs Tech. J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
16
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Comput. Surv., vol. 42, no. 1, 2009, Art. no. 5.
-
(2009)
ACM Comput. Surv
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
17
-
-
33845735523
-
On inferring application protocol behaviors in encrypted network trafć
-
Dec
-
C. V. Wright, F. Monrose, and G. M. Masson, "On inferring application protocol behaviors in encrypted network trafć," J. Mach. Learn. Res., vol. 7, pp. 2745-2769, Dec. 2006.
-
(2006)
J. Mach. Learn. Res
, vol.7
, pp. 2745-2769
-
-
Wright, C.V.1
Monrose, F.2
Masson, G.M.3
-
18
-
-
80755134983
-
Traffic morphing: An efficient defense against statistical trafć analysis
-
C. V. Wright, S. E. Coull, and F. Monrose, "Traffic morphing: An efficient defense against statistical trafć analysis," in Proc. NDSS, 2009, pp. 1-14.
-
(2009)
Proc. NDSS
, pp. 1-14
-
-
Wright, C.V.1
Coull, S.E.2
Monrose, F.3
-
19
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
20
-
-
85084161366
-
Tor: The secondgeneration onion router
-
R. Dingledine, N. Mathewson, and P. F. Syverson, "Tor: The secondgeneration onion router," in Proc. USENIX Secur. Symp., 2004, pp. 303-320.
-
(2004)
Proc. USENIX Secur. Symp
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
21
-
-
0002054934
-
Crowds: Anonymity forWeb transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: Anonymity forWeb transactions," ACM Trans. Inf. Syst. Secur., vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Inf. Syst. Secur
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
22
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
P. Samarati and L. Sweeney, "Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression," in Proc. IEEE Symp. Res. Secur. Privacy (S&P), May 1998, pp. 1-19.
-
(1998)
Proc. IEEE Symp. Res. Secur. Privacy (S&P), May
, pp. 1-19
-
-
Samarati, P.1
Sweeney, L.2
-
23
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Mar
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "L-diversity: Privacy beyond k-anonymity," ACM Trans. Knowl. Discovery Data, vol. 1, no. 1, Mar. 2007, Art. no. 3.
-
(2007)
ACM Trans. Knowl. Discovery Data
, vol.1
, Issue.1
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
24
-
-
77952913726
-
Closeness: A new privacy measure for data publishing
-
Jul
-
N. Li, T. Li, and S. Venkatasubramanian, "Closeness: A new privacy measure for data publishing," IEEE Trans. Knowl. Data Eng., vol. 22, no. 7, pp. 943-956, Jul. 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng
, vol.22
, Issue.7
, pp. 943-956
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
25
-
-
33746335051
-
Differential privacy
-
C. Dwork, "Differential privacy," in Proc. ICALP, 2006, pp. 1-12.
-
(2006)
Proc. ICALP
, pp. 1-12
-
-
Dwork, C.1
-
26
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd Conf. Theory Cryptogr. (TCC), 2006, pp. 265-284.
-
(2006)
Proc. 3rd Conf. Theory Cryptogr. (TCC)
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
27
-
-
77952555772
-
A statistical framework for differential privacy
-
L. Wasserman and S. Zhou, "A statistical framework for differential privacy," J. Amer. Statist. Assoc., vol. 105, no. 489, pp. 375-389, 2010.
-
(2010)
J. Amer. Statist. Assoc
, vol.105
, Issue.489
, pp. 375-389
-
-
Wasserman, L.1
Zhou, S.2
-
29
-
-
84889029677
-
Membership privacy: A unifying framework for privacy de-nitions
-
Nov
-
N. Li, W. H. Qardaji, D. Su, Y. Wu, and W. Yang, "Membership privacy: A unifying framework for privacy de-nitions," in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS), Nov. 2013, pp. 889-900.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS)
, pp. 889-900
-
-
Li, N.1
Qardaji, W.H.2
Su, D.3
Wu, Y.4
Yang, W.5
-
30
-
-
84940878770
-
Conservative or liberal? Personalized differential privacy
-
Seoul, South Korea, Apr
-
Z. Jorgensen, T. Yu, and G. Cormode, "Conservative or liberal? Personalized differential privacy," in Proc. 31st IEEE Int. Conf. Data Eng. (ICDE), Seoul, South Korea, Apr. 2015, pp. 1023-1034.
-
(2015)
Proc. 31st IEEE Int. Conf. Data Eng. (ICDE)
, pp. 1023-1034
-
-
Jorgensen, Z.1
Yu, T.2
Cormode, G.3
-
31
-
-
84893263337
-
Privacy and mechanism design
-
M. M. Pai and A. Roth, "Privacy and mechanism design," ACM SIGecom Exchanges, vol. 12, no. 1, pp. 8-29, 2013.
-
(2013)
ACM SIGecom Exchanges
, vol.12
, Issue.1
, pp. 8-29
-
-
Pai, M.M.1
Roth, A.2
-
32
-
-
84921930898
-
What the rìght to be forgotten' means for privacy in a digital age
-
A. L. Newman, "What the rìght to be forgotten' means for privacy in a digital age," Science, vol. 347, no. 6221, pp. 507-508, 2015.
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 507-508
-
-
Newman, A.L.1
-
33
-
-
33745785112
-
Towards a privacy measurement criterion for voting systems
-
Atlanta, GA, USA, May
-
L. Coney, J. L. Hall, P. L. Vora, and D. Wagner, "Towards a privacy measurement criterion for voting systems," in Proc. Nat. Conf. Digit. Government Res., Atlanta, GA, USA, May 2005, pp. 287-288.
-
(2005)
Proc. Nat. Conf. Digit. Government Res
, pp. 287-288
-
-
Coney, L.1
Hall, J.L.2
Vora, P.L.3
Wagner, D.4
-
34
-
-
84869408876
-
Measuring vote privacy, revisited
-
Raleigh, NC, USA, Oct
-
D. Bernhard, V. Cortier, O. Pereira, and B. Warinschi, "Measuring vote privacy, revisited," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), Raleigh, NC, USA, Oct. 2012, pp. 941-952.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 941-952
-
-
Bernhard, D.1
Cortier, V.2
Pereira, O.3
Warinschi, B.4
-
35
-
-
84945188363
-
SoK: A comprehensive analysis of game-based ballot privacy de-nitions
-
San Jose, CA, USA, May 2015
-
D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, "SoK: A comprehensive analysis of game-based ballot privacy de-nitions," in Proc. IEEE Symp. Secur. Privacy (SP), San Jose, CA, USA, May 2015, pp. 499-516.
-
Proc. IEEE Symp. Secur. Privacy (SP)
, pp. 499-516
-
-
Bernhard, D.1
Cortier, V.2
Galindo, D.3
Pereira, O.4
Warinschi, B.5
-
36
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov
-
P. Samarati, "Protecting respondents' identities in microdata release," IEEE Trans. Knowl. Data Eng., vol. 13, no. 6, pp. 1010-1027, Nov. 2001.
-
(2001)
IEEE Trans. Knowl. Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
37
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
39
-
-
84883072323
-
Truthful incentive mechanisms for k-anonymity location privacy
-
Turin, Italy, Apr
-
D. Yang, X. Fang, and G. Xue, "Truthful incentive mechanisms for k-anonymity location privacy," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2994-3002.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2994-3002
-
-
Yang, D.1
Fang, X.2
Xue, G.3
-
40
-
-
84883091913
-
A game-theoretic approach for achieving k-anonymity in location based services
-
Turin, Italy, Apr
-
X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, "A game-theoretic approach for achieving k-anonymity in location based services," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 2985-2993.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2985-2993
-
-
Liu, X.1
Liu, K.2
Guo, L.3
Li, X.4
Fang, Y.5
-
41
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
Nov
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer, "From t-closeness-like privacy to postrandomization via information theory," IEEE Trans. Knowl. Data Eng., vol. 22, no. 11, pp. 1623-1636, Nov. 2010.
-
(2010)
IEEE Trans. Knowl. Data Eng
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
42
-
-
84979840335
-
Heterogeneous differential privacy
-
M. Alaggan, S. Gambs, and A. Kermarrec, "Heterogeneous differential privacy," CoRR, 2015. [Online]. Available: http://arxiv.org/ abs/1504.06998
-
(2015)
CoRR
-
-
Alaggan, M.1
Gambs, S.2
Kermarrec, A.3
-
43
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
Alexandria, VA, USA, Oct./Nov
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. 13th ACMConf. Comput. Commun. Secur. (CCS), Alexandria, VA, USA, Oct./Nov. 2006, pp. 89-98.
-
(2006)
Proc. 13th ACMConf. Comput. Commun. Secur. (CCS)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
44
-
-
79957993008
-
Decentralizing attribute-based encryption
-
Tallinn, Estonia, May
-
A. B. Lewko and B. Waters, "Decentralizing attribute-based encryption," in Proc. 30th Annu. Int. Conf. Theory Appl. Cryptogr. Techn., Tallinn, Estonia, May 2011, pp. 568-588.
-
(2011)
Proc. 30th Annu. Int. Conf. Theory Appl. Cryptogr. Techn
, pp. 568-588
-
-
Lewko, A.B.1
Waters, B.2
-
46
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Berkeley, CA, USA, May
-
D. X. Song, D. Wagner, and A. Perrig, "Practical techniques for searches on encrypted data," in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, May 2000, pp. 44-55.
-
(2000)
Proc. IEEE Symp. Secur. Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
47
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Alexandria, VA, USA, Oct./Nov
-
R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: Improved de-nitions and efficient constructions," in Proc. 13th ACMConf. Comput. Commun. Secur. (CCS), Alexandria, VA, USA, Oct./Nov. 2006, pp. 79-88.
-
(2006)
Proc. 13th ACMConf. Comput. Commun. Secur. (CCS)
, pp. 79-88
-
-
Curtmola, R.1
Garay, J.A.2
Kamara, S.3
Ostrovsky, R.4
-
48
-
-
0005301490
-
On data banks and privacy homomorphisms
-
San Diego, CA, USA: Academic
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation. San Diego, CA, USA: Academic, 1978, pp. 169-179.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
49
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Bethesda, MD, USA, May/Jun
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., Bethesda, MD, USA, May/Jun. 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput
, pp. 169-178
-
-
Gentry, C.1
-
50
-
-
84863310390
-
Computing blindfolded: New developments in fully homomorphic encryption
-
Palm Springs, CA, USA Oct
-
V. Vaikuntanathan, "Computing blindfolded: New developments in fully homomorphic encryption," in Proc. IEEE 52nd Annu. Symp. Found. Comput. Sci., Palm Springs, CA, USA, Oct. 2011, pp. 5-16.
-
(2011)
Proc. IEEE 52nd Annu. Symp. Found. Comput. Sci
, pp. 5-16
-
-
Vaikuntanathan, V.1
-
52
-
-
84864253438
-
Statistical identićation of encrypted Web browsing trafć
-
Berkeley, CA, USA, May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical identićation of encrypted Web browsing trafć," in Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, May 2002, pp. 19-30.
-
(2002)
Proc. IEEE Symp. Secur. Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
53
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
Alexandria, VA, USA, Oct./Nov
-
M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in Proc. 13th ACM Conf. Comput. Commun. Secur., Alexandria, VA, USA, Oct./Nov. 2006, pp. 255-263.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
54
-
-
77953123409
-
Correlation-based trafć analysis attacks on anonymity networks
-
Jul
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "Correlation-based trafć analysis attacks on anonymity networks," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 7, pp. 954-967, Jul. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst
, vol.21
, Issue.7
, pp. 954-967
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
55
-
-
45249083605
-
Anonymous networking amidst eavesdroppers
-
Jun
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2770-2784, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
56
-
-
84923317932
-
Information security in big data: Privacy and data mining
-
Oct
-
L. Xu, C. Jiang, J. Wang, J. Yuan, and Y. Ren, "Information security in big data: Privacy and data mining," IEEE Access, vol. 2, pp. 1149-1176, Oct. 2014.
-
(2014)
IEEE Access
, vol.2
, pp. 1149-1176
-
-
Xu, L.1
Jiang, C.2
Wang, J.3
Yuan, J.4
Ren, Y.5
-
57
-
-
84920857531
-
Correlated differential privacy: Hiding information in non-IID data set
-
Feb
-
T. Zhu, P. Xiong, G. Li, and W. Zhou, "Correlated differential privacy: Hiding information in non-IID data set," IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 229-242, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 229-242
-
-
Zhu, T.1
Xiong, P.2
Li, G.3
Zhou, W.4
-
58
-
-
85032751316
-
Privacy-preserving biometric identićation using secure multiparty computation: An overview and recent trends
-
Mar
-
J. Bringer, H. Chabanne, and A. Patey, "Privacy-preserving biometric identićation using secure multiparty computation: An overview and recent trends," IEEE Signal Process. Mag., vol. 30, no. 2, pp. 42-52, Mar. 2013.
-
(2013)
IEEE Signal Process. Mag
, vol.30
, Issue.2
, pp. 42-52
-
-
Bringer, J.1
Chabanne, H.2
Patey, A.3
-
59
-
-
85032751180
-
Privacy protection in biometricbased recognition systems: A marriage between cryptography and signal processing
-
Sep
-
M. Barni, G. Droandi, and R. Lazzeretti, "Privacy protection in biometricbased recognition systems: A marriage between cryptography and signal processing," IEEE Signal Process. Mag., vol. 32, no. 5, pp. 66-76, Sep. 2015.
-
(2015)
IEEE Signal Process. Mag
, vol.32
, Issue.5
, pp. 66-76
-
-
Barni, M.1
Droandi, G.2
Lazzeretti, R.3
-
60
-
-
79951830125
-
Privacy-security trade-offs in biometric security systems-Part I: Single use case
-
Jan
-
L. Lai, S. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems-Part I: Single use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 122-139, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 122-139
-
-
Lai, L.1
Ho, S.2
Poor, H.V.3
-
61
-
-
79951822559
-
Privacy-security trade-offs in biometric security systems-Part II: Multiple use case
-
Jan
-
L. Lai, S. Ho, and H. V. Poor, "Privacy-security trade-offs in biometric security systems-Part II: Multiple use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 140-151, Jan. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 140-151
-
-
Lai, L.1
Ho, S.2
Poor, H.V.3
-
62
-
-
84959386530
-
Fundamental limits for privacypreserving biometric identićation systems that support authentication
-
Oct
-
T. Ignatenko and F. M. J. Willems, "Fundamental limits for privacypreserving biometric identićation systems that support authentication," IEEE Trans. Inf. Theory, vol. 61, no. 10, pp. 5583-5594, Oct. 2015.
-
(2015)
IEEE Trans. Inf. Theory
, vol.61
, Issue.10
, pp. 5583-5594
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
63
-
-
84997149426
-
What else does your biometric data reveal? A survey on soft biometrics
-
Mar
-
A. Dantcheva, P. Elia, and A. Ross, "What else does your biometric data reveal? A survey on soft biometrics," IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 441-467, Mar. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.3
, pp. 441-467
-
-
Dantcheva, A.1
Elia, P.2
Ross, A.3
-
64
-
-
33745604236
-
Stable signal recovery from incomplete and inaccurate measurements
-
E. J. Candés, J. K. Romberg, and T. Tao, "Stable signal recovery from incomplete and inaccurate measurements," Commun. Pure Appl. Math., vol. 59, no. 8, pp. 1207-1223, 2006.
-
(2006)
Commun. Pure Appl. Math
, vol.59
, Issue.8
, pp. 1207-1223
-
-
Candés, E.J.1
Romberg, J.K.2
Tao, T.3
-
65
-
-
33645712892
-
Compressed sensing
-
Apr
-
D. L. Donoho, "Compressed sensing," IEEE Trans. Inf. Theory, vol. 52, no. 4, pp. 1289-1306, Apr. 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.4
, pp. 1289-1306
-
-
Donoho, D.L.1
-
66
-
-
84874284297
-
Game theory meets network security and privacy
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J. Hubaux, "Game theory meets network security and privacy," ACM Comput. Surv., vol. 45, no. 3, p. 25, 2013.
-
(2013)
ACM Comput. Surv
, vol.45
, Issue.3
, pp. 25
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.5
-
67
-
-
84875024246
-
Noncooperative location privacy
-
Mar./Apr
-
J. Freudiger, M. H. Manshaei, J. Hubaux, and D. C. Parkes, "Noncooperative location privacy," IEEE Trans. Dependable Secure Comput., vol. 10, no. 2, pp. 84-98, Mar./Apr. 2013.
-
(2013)
IEEE Trans. Dependable Secure Comput
, vol.10
, Issue.2
, pp. 84-98
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.3
Parkes, D.C.4
-
68
-
-
84899565101
-
A tutorial on interactive sensing in social networks
-
Mar
-
V. Krishnamurthy and H. V. Poor, "A tutorial on interactive sensing in social networks," IEEE Trans. Comput. Social Syst., vol. 1, no. 1, pp. 3-21, Mar. 2014.
-
(2014)
IEEE Trans. Comput. Social Syst
, vol.1
, Issue.1
, pp. 3-21
-
-
Krishnamurthy, V.1
Poor, H.V.2
-
70
-
-
79959622530
-
Selling privacy at auction
-
San Jose, CA, USA, Jun
-
A. Ghosh and A. Roth, "Selling privacy at auction," in Proc. 12th ACM Conf. Electron. Commerce, San Jose, CA, USA, Jun. 2011, pp. 199-208.
-
(2011)
Proc. 12th ACM Conf. Electron. Commerce
, pp. 199-208
-
-
Ghosh, A.1
Roth, A.2
-
71
-
-
84863535268
-
Approximately optimal auctions for selling privacy when costs are correlated with data
-
Valencia, Spain, Jun
-
L. Fleischer and Y. Lyu, "Approximately optimal auctions for selling privacy when costs are correlated with data," in Proc. ACM Conf. Electron. Commerce, Valencia, Spain, Jun. 2012, pp. 568-585.
-
(2012)
Proc. ACM Conf. Electron. Commerce
, pp. 568-585
-
-
Fleischer, L.1
Lyu, Y.2
-
72
-
-
84871390246
-
Take it or leave it: Running a survey when privacy comes at a cost
-
Liverpool, U.K., Dec
-
K. Ligett and A. Roth, "Take it or leave it: Running a survey when privacy comes at a cost," in Proc. 8th Int. Workshop Internet Netw. Econ., Liverpool, U.K., Dec. 2012, pp. 378-391.
-
(2012)
Proc. 8th Int. Workshop Internet Netw. Econ
, pp. 378-391
-
-
Ligett, K.1
Roth, A.2
-
73
-
-
84942327005
-
Privacy or utility in data collection? A contract theoretic approach
-
Oct
-
L. Xu, C. Jiang, Y. Chen, Y. Ren, and K. J. R. Liu, "Privacy or utility in data collection? A contract theoretic approach," J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1256-1269, Oct. 2015.
-
(2015)
J. Sel. Topics Signal Process
, vol.9
, Issue.7
, pp. 1256-1269
-
-
Xu, L.1
Jiang, C.2
Chen, Y.3
Ren, Y.4
Liu, K.J.R.5
-
74
-
-
84921898213
-
Privacy and human behavior in the age of information
-
A. Acquisti, L. Brandimarte, and G. Loewenstein, "Privacy and human behavior in the age of information," Science, vol. 347, no. 6221, pp. 509-514, 2015.
-
(2015)
Science
, vol.347
, Issue.6221
, pp. 509-514
-
-
Acquisti, A.1
Brandimarte, L.2
Loewenstein, G.3
-
75
-
-
84937773817
-
Data, privacy, and the greater good
-
E. Horvitz and D. Mulligan, "Data, privacy, and the greater good," Science, vol. 349, no. 6245, pp. 253-255, 2015.
-
(2015)
Science
, vol.349
, Issue.6245
, pp. 253-255
-
-
Horvitz, E.1
Mulligan, D.2
-
76
-
-
84878266591
-
Smart meter privacy: A theoretical framework
-
Jun
-
L. Sankar, S. R. Rajagopalan, S. Mohajer, and H. V. Poor, "Smart meter privacy: A theoretical framework," IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 837-846, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
, pp. 837-846
-
-
Sankar, L.1
Rajagopalan, S.R.2
Mohajer, S.3
Poor, H.V.4
-
79
-
-
72849125444
-
Discriminating DDoS flows from flash crowds using information distance
-
Gold Coast, QLD, Australia, Oct
-
S. Yu, T. Thapngam, J. Liu, S. Wei, and W. Zhou, "Discriminating DDoS flows from flash crowds using information distance," in Proc. 3rd Int. Conf. Netw. Syst. Secur., Gold Coast, QLD, Australia, Oct. 2009, pp. 351-356.
-
(2009)
Proc. 3rd Int. Conf. Netw. Syst. Secur
, pp. 351-356
-
-
Yu, S.1
Thapngam, T.2
Liu, J.3
Wei, S.4
Zhou, W.5
-
80
-
-
36249029853
-
Correntropy: Properties and applications in non-Gaussian signal processing
-
Nov
-
W. Liu, P. P. Pokharel, and J. C. Principe, "Correntropy: Properties and applications in non-Gaussian signal processing," IEEE Trans. Signal Process., vol. 55, no. 11, pp. 5286-5298, Nov. 2007.
-
(2007)
IEEE Trans. Signal Process
, vol.55
, Issue.11
, pp. 5286-5298
-
-
Liu, W.1
Pokharel, P.P.2
Principe, J.C.3
-
81
-
-
82955186376
-
Going viral: Flash crowds in an open CDN
-
Berlin, Germany Nov
-
P. Wendell and M. J. Freedman, "Going viral: Flash crowds in an open CDN," in Proc. 11th ACM SIGCOMM Internet Meas. Conf., Berlin, Germany, Nov. 2011, pp. 549-558.
-
(2011)
Proc. 11th ACM SIGCOMM Internet Meas. Conf
, pp. 549-558
-
-
Wendell, P.1
Freedman, M.J.2
-
82
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
Providence, RI, USA, Jun./Jul
-
F. McSherry, "Privacy integrated queries: An extensible platform for privacy-preserving data analysis," in Proc. ACM SIGMOD Int. Conf. Manage. Data, Providence, RI, USA, Jun./Jul. 2009, pp. 19-30.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 19-30
-
-
McSherry, F.1
-
83
-
-
84942288037
-
The staircase mechanism in differential privacy
-
Oct
-
Q. Geng, P. Kairouz, S. Oh, and P. Viswanath, "The staircase mechanism in differential privacy," IEEE J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1176-1184, Oct. 2015.
-
(2015)
IEEE J. Sel. Topics Signal Process
, vol.9
, Issue.7
, pp. 1176-1184
-
-
Geng, Q.1
Kairouz, P.2
Oh, S.3
Viswanath, P.4
-
84
-
-
0033604507
-
Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations
-
D. Gottesman and I. L. Chuang, "Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations," Nature, vol. 402, no. 6760, pp. 390-393, 1999.
-
(1999)
Nature
, vol.402
, Issue.6760
, pp. 390-393
-
-
Gottesman, D.1
Chuang, I.L.2
-
85
-
-
84856074693
-
Demonstration of blind quantum computing
-
S. Barz, E. Kashefi, A. Broadbent, J. F. Fitzsimons, A. Zeilinger, and P. Walther, "Demonstration of blind quantum computing," Science, vol. 335, no. 6066, pp. 303-308, 2012.
-
(2012)
Science
, vol.335
, Issue.6066
, pp. 303-308
-
-
Barz, S.1
Kashefi, E.2
Broadbent, A.3
Fitzsimons, J.F.4
Zeilinger, A.5
Walther, P.6
-
86
-
-
84979793202
-
-
accessed on May 17
-
Advances in Computational Psychophysiology, accessed on May 17, 2016. [Online]. Available: http://www.sciencemag.org/custompublishing/ collections/advances-computational-psychophysiology
-
(2016)
Advances in Computational Psychophysiology
-
-
|