An effective value swapping method for privacy preserving data publishing
暂无分享,去创建一个
[1] Len Tashman,et al. Percentage Error: What Denominator? , 2009 .
[2] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[3] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[4] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[5] Pierangela Samarati,et al. Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.
[6] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[7] Jiming Chen,et al. Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.
[8] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[9] Manish Bhardwaj,et al. Privacy preserving data publishing through slicing , 2015 .
[10] Alphonsa Vedangi. DATA SLICING TECHNIQUE TO PRIVACY PRESERVING AND DATA PUBLISHING , 2013 .
[11] Ninghui Li,et al. Slicing: A New Approach for Privacy Preserving Data Publishing , 2009, IEEE Transactions on Knowledge and Data Engineering.
[12] Chalasani Ajun. Slicing: A New Approach to Privacy Preserving Data Publishing , 2015 .
[13] Santhosh Kumar. A New Approach For Collaborative Data Publishing Using Slicing And M-Privacy , 2014 .
[14] Raymond Chi-Wing Wong,et al. Privacy-Preserving Data Publishing: An Overview , 2010, Privacy-Preserving Data Publishing: An Overview.
[15] Torben Bach Pedersen,et al. Multidimensional Databases and Data Warehousing , 2010, Multidimensional Databases and Data Warehousing.
[16] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[17] Ninghui Li,et al. Injector: Mining Background Knowledge for Data Anonymization , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[18] Peng Cheng,et al. Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[19] Ninghui Li,et al. Modeling and Integrating Background Knowledge in Data Anonymization , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[20] Guihai Chen,et al. SLICER: A Slicing-Based K-Anonymous Privacy Preserving Scheme for Participatory Sensing , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[21] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[22] Santhosh Kumar.B. A New Approach For Collaborative DataPublishing Using Slicing And M-Privacy , 2014 .
[23] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.