Exact and heuristic methods for cell suppression in multi-dimensional linked tables
暂无分享,去创建一个
Ramayya Krishnan | George T. Duncan | Stephen F. Roehrig | Rema Padman | G. Duncan | R. Padman | R. Krishnan | S. Roehrig
[1] Ivan P. Fellegi,et al. On the Question of Statistical Confidentiality , 1972 .
[2] Thomas L. Magnanti,et al. Applied Mathematical Programming , 1977 .
[3] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[4] B. Causey,et al. Applications of Transportation Theory to Statistical Problems , 1985 .
[5] L. Cox. A Constructive Procedure for Unbiased Controlled Rounding , 1987 .
[6] Robin Lougee-Heimer. Guarantying Confidentiality the Protection of Tabular Data , 1989 .
[7] D. Lambert,et al. The Risk of Disclosure for Microdata , 1989 .
[8] James P. Kelly,et al. Using Simulated Annealing to Solve Controlled Rounding Problems , 1990, INFORMS J. Comput..
[9] James P. Kelly,et al. Controlled Rounding of Tabular Data , 1990, Oper. Res..
[10] George T. Duncan,et al. Microdata disclosure limitation in statistical databases: query size and random sample query control , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] James P. Kelly,et al. Cell suppression: Disclosure protection for sensitive tabular data , 1992, Networks.
[12] Laura Zayatz. USING LINEAR PROGRAMMING METHODOLOGY FOR DISCLOSURE AVOIDANCE PURPOSES , 1992 .
[13] N. Dellaert,et al. Statistical Disclosure in Two-Dimensional Tables: General Tables , 1994 .
[14] Dinesh Batra,et al. Accessibility, security, and accuracy in statistical databases: the case for the multiplicative fixed data perturbation approach , 1995 .
[15] Lawrence H. Cox,et al. Network Models for Complementary Cell Suppression , 1995 .
[16] Ton de Waal,et al. Statistical Disclosure Control in Practice , 1996 .
[17] George T. Duncan,et al. Obtaining Information while Preserving Privacy: A Markov Perturbation Method for Tabular Data , 1997 .
[18] Laura Voshell Zayatz,et al. Using noise for disclosure limi-tation of establishment tabular data , 1998 .
[19] Paulo B. Góes,et al. Interval Protection of Confidential Information in a Database , 1998, INFORMS J. Comput..
[20] Ramayya Krishnan,et al. Inference of three-way table entries from two-dimensional projections , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[21] Ramayya Krishnan,et al. Disclosure Detection in Multivariate Categorical Databases: Auditing Confidentiality Protection Through Two New Matrix Operators , 1999 .
[22] M. Fischetti,et al. Models and Algorithms for Optimizing Cell Suppression in Tabular Data with Linear Constraints , 2000 .
[23] S E Fienberg,et al. INAUGURAL ARTICLE by a Recently Elected Academy Member:Bounds for cell entries in contingency tables given marginal totals and decomposable graphs , 2000 .
[24] George T. Duncan,et al. Optimal Disclosure Limitation Strategy in Statistical Databases: Deterring Tracker Attacks through Additive Noise , 2000 .
[25] L. Zayatz,et al. A NETWORK FLOW DISCLOSURE AVOIDANCE SYSTEM APPLIED TO THE CENSUS OF AGRICULTURE , 2002 .
[26] C. Sullivan,et al. A Data Structure and Integer Programming Technique to Facilitate Cell Suppression Strategies , 2002 .
[27] Gabriela Schütz,et al. Cell suppression problem: A genetic-based approach , 2008, Comput. Oper. Res..
[28] Alistair R. Clark,et al. A Genetic Approach to Statistical Disclosure Control , 2012, IEEE Transactions on Evolutionary Computation.