Genetic grey wolf optimization and C-mixture for collaborative data publishing

Data publishing is an area of interest in present day technology that has gained huge attention of researchers and experts. The concept of data publishing faces a lot of security issues, indicating...

[1]  J. McCall,et al.  Genetic algorithms for modelling and optimisation , 2005 .

[2]  Aris Gkoulalas-Divanis,et al.  Efficient and flexible anonymization of transaction data , 2012, Knowledge and Information Systems.

[3]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[4]  Charu C. Aggarwal,et al.  Managing dimensionality in data privacy anonymization , 2015, Knowledge and Information Systems.

[5]  Andrew Lewis,et al.  Grey Wolf Optimizer , 2014, Adv. Eng. Softw..

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Jingyu Hua,et al.  Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms , 2016, IEEE Transactions on Information Forensics and Security.

[8]  Bradley Malin,et al.  COAT: COnstraint-based anonymization of transactions , 2010, Knowledge and Information Systems.

[9]  Elisa Bertino,et al.  Efficient systematic clustering method for k-anonymization , 2011, Acta Informatica.

[10]  Josep Domingo-Ferrer,et al.  Generalization-based privacy preservation and discrimination prevention in data publishing and mining , 2014, Data Mining and Knowledge Discovery.

[11]  Anitha S. Pillai,et al.  Adaptive Utility-based Anonymization Model: Performance Evaluation on Big Data Sets , 2015 .

[12]  Tamir Tassa,et al.  A practical approximation algorithm for optimal k-anonymity , 2011, Data Mining and Knowledge Discovery.

[13]  Jemal H. Abawajy,et al.  Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.

[14]  Nasser Yazdani,et al.  Hierarchical anonymization algorithms against background knowledge attack in data releasing , 2016, Knowl. Based Syst..

[15]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[16]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[17]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.