Enabling Mobile and Wireless Technologies for Smart Cities: Part 2
暂无分享,去创建一个
Mohsen Guizani | Guangjie Han | Jaime Lloret | Ejaz Ahmed | Muhammad Imran Razzak | Ammar Rayes | Wael Guibène
[1] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[2] Niall Sclater,et al. Code of practice for learning analytics , 2015 .
[3] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[4] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[5] Jenni Swenson,et al. Establishing an ethical literacy for learning analytics , 2014, LAK.
[6] Daniel J. Solove,et al. Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .
[7] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[8] Seda F. Gürses. Can you engineer privacy? , 2014, CACM.
[9] P. Prinsloo,et al. Learning Analytics , 2013 .
[10] George Siemens,et al. Learning analytics and educational data mining: towards communication and collaboration , 2012, LAK.
[11] M. A. Crook. The Risks of Absolute Medical Confidentiality , 2013, Sci. Eng. Ethics.
[12] Mandy Lupton,et al. Learning analytics beyond the LMS: the connected learning analytics toolkit , 2015, LAK.
[13] Leah P. Macfadyen,et al. Embracing Big Data in Complex Educational Systems: The Learning Analytics Imperative and the Policy Challenge. , 2014 .
[14] Basit Shafiq,et al. Differentially Private Naive Bayes Classification , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).
[15] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[16] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[17] Yücel Saygin,et al. Privacy-Preserving Publishing of Hierarchical Data , 2016, ACM Trans. Priv. Secur..
[18] Arvind Narayanan,et al. No silver bullet: De-identification still doesn't work , 2014 .
[19] Paul Ohm. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .
[20] Paul Prinsloo,et al. An evaluation of policy frameworks for addressing ethical considerations in learning analytics , 2013, LAK '13.
[21] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[22] Eitel J. M. Lauría,et al. Early Alert of Academically At-Risk Students: An Open Source Analytics Initiative , 2014, J. Learn. Anal..
[23] Traian Marius Truta,et al. Protection : p-Sensitive k-Anonymity Property , 2006 .
[24] Hendrik Drachsler,et al. Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics , 2016, LAK.
[25] Yufei Tao,et al. The hardness and approximation algorithms for l-diversity , 2009, EDBT '10.
[26] George Siemens,et al. Ethical and privacy principles for learning analytics , 2014, Br. J. Educ. Technol..
[27] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[28] Chris Clifton,et al. On syntactic anonymity and differential privacy , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).
[29] Hae Okimoto,et al. The PAR Framework Proof of Concept: Initial Findings from a Multi-Institutional Analysis of Federated Postsecondary Data , 2012 .
[30] Paul Prinsloo,et al. Student privacy self-management: implications for learning analytics , 2015, LAK.
[31] Jennifer Heath,et al. Contemporary Privacy Theory Contributions to Learning Analytics , 2014, J. Learn. Anal..
[32] Daniel J. Solove. The Digital Person , 2022 .
[33] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[34] Benjamin C. M. Fung,et al. Anonymizing sequential releases , 2006, KDD '06.
[35] Seeta Peña Gangadharan,et al. Digital inclusion and data profiling , 2012, First Monday.
[36] K. Crawford. The Hidden Biases in Big Data , 2013 .
[37] Chris Clifton,et al. Thoughts on k-Anonymization , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[38] D. Boyd,et al. Six Provocations for Big Data , 2011 .
[39] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[40] Chris Clifton,et al. Multirelational k-Anonymity , 2009, IEEE Trans. Knowl. Data Eng..
[41] Mathieu d'Aquin,et al. The learning analytics & knowledge (LAK) data challenge 2014 , 2014, LAK '14.