Publishing Skewed Sensitive Microdata
暂无分享,去创建一个
Raymond Chi-Wing Wong | Ke Wang | Ada Wai-Chee Fu | Yabo Xu | A. Fu | R. C. Wong | Ke Wang | Yabo Xu
[1] Nitesh V. Chawla,et al. SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..
[2] Pedro M. Domingos. MetaCost: a general method for making classifiers cost-sensitive , 1999, KDD '99.
[3] Raymond Chi-Wing Wong,et al. Minimality Attack in Privacy Preserving Data Publishing , 2007, VLDB.
[4] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[5] Lada A. Adamic. Zipf, Power-laws, and Pareto-a ranking tutorial , 2000 .
[6] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[7] Catherine Blake,et al. UCI Repository of machine learning databases , 1998 .
[8] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[9] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[10] Elisa Bertino,et al. Secure Anonymization for Incremental Datasets , 2006, Secure Data Management.
[11] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[12] R. Greenlee. Measuring disease frequency in the Marshfield Epidemiologic Study Area (MESA). , 2003, Clinical medicine & research.
[13] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[14] Wenliang Du,et al. Privacy-MaxEnt: integrating background knowledge in privacy quantification , 2008, SIGMOD Conference.
[15] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[16] Jesse C Arnold Professor Emeritus,et al. Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences , 1990 .
[17] Jian Pei,et al. Anonymity for continuous data publishing , 2008, EDBT '08.
[18] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[19] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[20] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[21] Ashwin Machanavajjhala,et al. Worst-Case Background Knowledge for Privacy-Preserving Data Publishing , 2007, 2007 IEEE 23rd International Conference on Data Engineering.