-
1
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Computing Surveys (CSUR), vol. 42, no. 4, p. 14, 2010.
-
(2010)
ACM Computing Surveys (CSUR)
, vol.42
, Issue.4
, pp. 14
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
2
-
-
79960907469
-
K-anonymity
-
V. Ciriani, S. D. C. Di Vimercati, S. Foresti, and P. Samarati, "K-anonymity," Advances in Information Security, 2007.
-
(2007)
Advances in Information Security
-
-
Ciriani, V.1
Di Vimercati, S.D.C.2
Foresti, S.3
Samarati, P.4
-
3
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity," ACM TKDD, vol. 1, no. 1, p. 3, 2007.
-
(2007)
ACM TKDD
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
4
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in ACM PODS. ACM, 2001, pp. 247-255.
-
(2001)
ACM PODS. ACM
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
5
-
-
77954728128
-
K-isomorphism: Privacy preserving network publication against structural attacks
-
J. Cheng, A. W.-c. Fu, and J. Liu, "K-isomorphism: privacy preserving network publication against structural attacks," in SIGMOD. ACM, 2010, pp. 459-470.
-
(2010)
SIGMOD. ACM
, pp. 459-470
-
-
Cheng, J.1
Fu, A.W.-C.2
Liu, J.3
-
6
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec, "Protecting location privacy: optimal strategy against localization attacks," in CCS. ACM, 2012, pp. 617-627.
-
(2012)
CCS. ACM
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
7
-
-
0000072558
-
Finding a needle in a haystack-or identifying anonymous census record
-
T. Dalenius, "Finding a needle in a haystack-or identifying anonymous census record," Journal of official statistics, vol. 2, no. 3, pp. 329-336, 1986.
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
8
-
-
84856191070
-
A survey of privacy-preservation of graphs and social networks
-
Springer
-
X. Wu, X. Ying, K. Liu, and L. Chen, "A survey of privacy-preservation of graphs and social networks," in Managing and mining graph data. Springer, 2010, pp. 421-453.
-
(2010)
Managing and Mining Graph Data
, pp. 421-453
-
-
Wu, X.1
Ying, X.2
Liu, K.3
Chen, L.4
-
9
-
-
67649641460
-
Modeling and integrating background knowl-edge in data anonymization
-
T. Li, N. Li, and J. Zhang, "Modeling and integrating background knowl-edge in data anonymization," in Data Engineering, 2009. ICDE'09. IEEE 25th International Conference on. IEEE, 2009, pp. 6-17.
-
(2009)
Data Engineering, 2009. ICDE'09. IEEE 25th International Conference On. IEEE
, pp. 6-17
-
-
Li, T.1
Li, N.2
Zhang, J.3
-
10
-
-
85011039411
-
Privacy skyline: Privacy with multidimensional adversarial knowledge
-
B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy skyline: Privacy with multidimensional adversarial knowledge," in Proceedings of the 33rd international conference on Very large data bases. VLDB Endowment, 2007, pp. 770-781.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB Endowment
, pp. 770-781
-
-
Chen, B.-C.1
LeFevre, K.2
Ramakrishnan, R.3
-
12
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publish-ing
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern, "Worst-case background knowledge for privacy-preserving data publish-ing," in Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. IEEE, 2007, pp. 126-135.
-
(2007)
Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference On. IEEE
, pp. 126-135
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
13
-
-
84983364700
-
De-anonymizing social networks and inferring private attributes using knowledge graphs
-
J. Qian, X.-Y. Li, C. Zhang, and l. Chen, "De-anonymizing social networks and inferring private attributes using knowledge graphs," in INFOCOM. IEEE, 2016.
-
(2016)
INFOCOM. IEEE
-
-
Qian, J.1
Li, X.-Y.2
Zhang, C.3
Chen, L.4
-
14
-
-
57149146157
-
Privacy-maxent: Integrating background knowledge in privacy quantification
-
W. Du, Z. Teng, and Z. Zhu, "Privacy-maxent: integrating background knowledge in privacy quantification," in Proceedings of the 2008 ACM SIGMOD international conference on Management of data. ACM, 2008, pp. 459-472.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. ACM
, pp. 459-472
-
-
Du, W.1
Teng, Z.2
Zhu, Z.3
-
15
-
-
0035789644
-
Co-clustering documents and words using bipartite spectral graph partitioning
-
I. S. Dhillon, "Co-clustering documents and words using bipartite spectral graph partitioning," in SIGKDD. ACM, 2001, pp. 269-274.
-
(2001)
SIGKDD. ACM
, pp. 269-274
-
-
Dhillon, I.S.1
-
16
-
-
33846251992
-
Spectral partitioning works: Planar graphs and finite element meshes
-
D. A. Spielman and S.-H. Teng, "Spectral partitioning works: Planar graphs and finite element meshes," Linear Algebra and its Applications, vol. 421, no. 2, pp. 284-305, 2007.
-
(2007)
Linear Algebra and Its Applications
, vol.421
, Issue.2
, pp. 284-305
-
-
Spielman, D.A.1
Teng, S.-H.2
-
19
-
-
80052648113
-
Friendship and mobility: User movement in location-based social networks
-
E. Cho, S. A. Myers, and J. Leskovec, "Friendship and mobility: user movement in location-based social networks," in SIGKDD. ACM, 2011, pp. 1082-1090.
-
(2011)
SIGKDD. ACM
, pp. 1082-1090
-
-
Cho, E.1
Myers, S.A.2
Leskovec, J.3
-
20
-
-
84873663513
-
Flash: Efficient, stable and optimal k-anonymity
-
F. Kohlmayer, F. Prasser, C. Eckert, A. Kemper, and K. A. Kuhn, "Flash: efficient, stable and optimal k-anonymity," in PASSAT and SocialCom. IEEE, 2012, pp. 708-717.
-
(2012)
PASSAT and SocialCom. IEEE
, pp. 708-717
-
-
Kohlmayer, F.1
Prasser, F.2
Eckert, C.3
Kemper, A.4
Kuhn, K.A.5
-
21
-
-
84983290830
-
Theory and practical applications for statistical agencies
-
J. Domingo-Ferrer and V. Torra, "Theory and practical applications for statistical agencies," North-Holland: Amsterdam, pp. 113-134, 2002.
-
(2002)
North-Holland: Amsterdam
, pp. 113-134
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
22
-
-
33745599656
-
Checking for k-anonymity violation by views
-
C. Yao, X. S. Wang, and S. Jajodia, "Checking for k-anonymity violation by views," in VLDB. VLDB Endowment, 2005, pp. 910-921.
-
(2005)
VLDB. VLDB Endowment
, pp. 910-921
-
-
Yao, C.1
Wang, X.S.2
Jajodia, S.3
-
23
-
-
34250661905
-
Achieving anonymity via clustering
-
G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D. Thomas, and A. Zhu, "Achieving anonymity via clustering," in ACM Symposium on Principles of database systems. ACM, 2006, pp. 153-162.
-
(2006)
ACM Symposium on Principles of Database Systems. ACM
, pp. 153-162
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Khuller, S.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
24
-
-
84865065669
-
K-automorphism: A general framework for privacy preserving network publication
-
L. Zou, L. Chen, and M. T. Özsu, "K-automorphism: A general framework for privacy preserving network publication," Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 946-957, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 946-957
-
-
Zou, L.1
Chen, L.2
Özsu, M.T.3
-
25
-
-
84904352532
-
Blowfish privacy: Tuning privacy-utility trade-offs using policies
-
X. He, A. Machanavajjhala, and B. Ding, "Blowfish privacy: Tuning privacy-utility trade-offs using policies," in SIGMOD. ACM, 2014, pp. 1447-1458.
-
(2014)
SIGMOD. ACM
, pp. 1447-1458
-
-
He, X.1
Machanavajjhala, A.2
Ding, B.3
-
26
-
-
34250673244
-
Injecting utility into anonymized datasets
-
D. Kifer and J. Gehrke, "Injecting utility into anonymized datasets," in SIGMOD. ACM, 2006, pp. 217-228.
-
(2006)
SIGMOD. ACM
, pp. 217-228
-
-
Kifer, D.1
Gehrke, J.2
-
28
-
-
77955045035
-
Graph clustering based on struc-tural/attribute similarities
-
Y. Zhou, H. Cheng, and J. X. Yu, "Graph clustering based on struc-tural/attribute similarities," Proceedings of the VLDB Endowment, vol. 2, no. 1, pp. 718-729, 2009.
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 718-729
-
-
Zhou, Y.1
Cheng, H.2
Yu, J.X.3
-
29
-
-
84978707769
-
Membership privacy: A unifying framework for privacy definitions
-
N. Li, W. H. Qardaji, D. Su, and Y. W. andWeining Yang, "Membership privacy: a unifying framework for privacy definitions," in ACM CCS.
-
ACM CCS
-
-
Li, N.1
Qardaji, W.H.2
Su, D.3
Yang, Y.W.W.4
-
30
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
S. Agrawal and J. R. Haritsa, "A framework for high-accuracy privacy-preserving mining," in ICDE. IEEE, 2005, pp. 193-204.
-
(2005)
ICDE. IEEE
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
31
-
-
84904305482
-
Hydra: Large-scale social identity linkage via heterogeneous behavior modeling
-
S. Liu, S. Wang, F. Zhu, J. Zhang, and R. Krishnan, "Hydra: Large-scale social identity linkage via heterogeneous behavior modeling," in SIGMOD. ACM, 2014, pp. 51-62.
-
(2014)
SIGMOD. ACM
, pp. 51-62
-
-
Liu, S.1
Wang, S.2
Zhu, F.3
Zhang, J.4
Krishnan, R.5
-
32
-
-
84893284736
-
Pufferfish: A framework for math-ematical privacy definitions
-
D. Kifer and A. Machanavajjhala, "Pufferfish: A framework for math-ematical privacy definitions," ACM Transactions on Database Systems (TODS), vol. 39, no. 1, p. 3, 2014.
-
(2014)
ACM Transactions on Database Systems (TODS)
, vol.39
, Issue.1
, pp. 3
-
-
Kifer, D.1
Machanavajjhala, A.2
-
33
-
-
77956224515
-
Versatile publishing for privacy preservation
-
X. Jin, M. Zhang, N. Zhang, and G. Das, "Versatile publishing for privacy preservation," in Proceedings of the 16th ACM SIGKDD inter-national conference on Knowledge discovery and data mining. ACM, 2010, pp. 353-362.
-
(2010)
Proceedings of the 16th ACM SIGKDD Inter-national Conference on Knowledge Discovery and Data Mining. ACM
, pp. 353-362
-
-
Jin, X.1
Zhang, M.2
Zhang, N.3
Das, G.4
-
34
-
-
84947255651
-
A framework for optimization in big data: Privacy-preserving multi-agent greedy algorithm
-
Springer
-
T. Jung, X.-Y. Li, and J. Han, "A framework for optimization in big data: Privacy-preserving multi-agent greedy algorithm," in Big Data Computing and Communications. Springer, 2015, pp. 88-102.
-
(2015)
Big Data Computing and Communications
, pp. 88-102
-
-
Jung, T.1
Li, X.-Y.2
Han, J.3
-
35
-
-
84944317130
-
Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices
-
L. Zhang, T. Jung, C. Liu, X. Ding, X.-Y. Li, and Y. Liu, "Pop: Privacy-preserving outsourced photo sharing and searching for mobile devices," in ICDCS, 2015 Proceedings IEEE. IEEE, 2015, pp. 308-317.
-
(2015)
ICDCS, 2015 Proceedings IEEE. IEEE
, pp. 308-317
-
-
Zhang, L.1
Jung, T.2
Liu, C.3
Ding, X.4
Li, X.-Y.5
Liu, Y.6
-
36
-
-
33746335051
-
Differential privacy
-
C. Dwork, "Differential privacy," in ICALP, 2006, pp. 1-12.
-
(2006)
ICALP
, pp. 1-12
-
-
Dwork, C.1
-
37
-
-
84904437773
-
Achieving differential privacy of data disclosure in the smart grid
-
J. Zhao, T. Jung, Y. Wang, and X. Li, "Achieving differential privacy of data disclosure in the smart grid," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 504-512.
-
(2014)
INFOCOM, 2014 Proceedings IEEE. IEEE
, pp. 504-512
-
-
Zhao, J.1
Jung, T.2
Wang, Y.3
Li, X.4
|