Managing dimensionality in data privacy anonymization
暂无分享,去创建一个
[1] Panos Kalnis,et al. Fast Data Anonymization with Low Information Loss , 2007, VLDB.
[2] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[3] Chris H. Q. Ding,et al. Minimum redundancy feature selection from microarray gene expression data , 2003, Computational Systems Bioinformatics. CSB2003. Proceedings of the 2003 IEEE Bioinformatics Conference. CSB2003.
[4] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[5] Fuhui Long,et al. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[7] Hiroshi Motoda,et al. Computational Methods of Feature Selection , 2022 .
[8] Jianneng Cao,et al. Publishing Microdata with a Robust Privacy Guarantee , 2012, Proc. VLDB Endow..
[9] Sushil Jajodia,et al. Combining fragmentation and encryption to protect privacy in data storage , 2010, TSEC.
[10] Daniel Kifer,et al. Attacks on privacy and deFinetti's theorem , 2009, SIGMOD Conference.
[11] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[12] Benjamin C. M. Fung,et al. Anonymizing healthcare data: a case study on the blood transfusion service , 2009, KDD.
[13] Ninghui Li,et al. Slicing: A New Approach for Privacy Preserving Data Publishing , 2009, IEEE Transactions on Knowledge and Data Engineering.
[14] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[15] Nikos Mamoulis,et al. Non-homogeneous generalization in privacy preserving data publishing , 2010, SIGMOD Conference.
[16] Sylvia L. Osborn,et al. Delay-sensitive approaches for anonymizing numerical streaming data , 2013, International Journal of Information Security.
[17] Philip S. Yu,et al. Anonymizing transaction databases for publication , 2008, KDD.
[18] David J. DeWitt,et al. Workload-aware anonymization , 2006, KDD '06.
[19] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[20] Chedy Raïssi,et al. Anonymizing set-valued data by nonreciprocal recoding , 2012, KDD.
[21] Nikos Mamoulis,et al. Privacy Preservation by Disassociation , 2012, Proc. VLDB Endow..
[22] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[23] Charu C. Aggarwal,et al. On Randomization, Public Information and the Curse of Dimensionality , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[24] Chi-Yin Chow,et al. Trajectory privacy in location-based services and data publication , 2011, SKDD.
[25] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[26] Charu C. Aggarwal,et al. Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy , 2014, SDM.
[27] Hiroshi Motoda,et al. Book Review: Computational Methods of Feature Selection , 2007, The IEEE intelligent informatics bulletin.
[28] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[29] Rajeev Motwani,et al. Distributing data for secure database services , 2011, PAIS '11.
[30] Panos Kalnis,et al. On the Anonymization of Sparse High-Dimensional Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[31] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[32] H. Hotelling. Analysis of a complex of statistical variables into principal components. , 1933 .
[33] Panos Kalnis,et al. Privacy-preserving anonymization of set-valued data , 2008, Proc. VLDB Endow..
[34] Stefan Gottschalk,et al. Privacy Preserving Data Mining Models And Algorithms , 2016 .
[35] Jayant R. Haritsa,et al. A Framework for High-Accuracy Privacy-Preserving Mining , 2005, ICDE.
[36] Sabrina De Capitani di Vimercati,et al. Guest Editorial: Special Issue on Computer and Communications Security , 2008, TSEC.
[37] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[38] Chris Clifton,et al. Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.
[39] Jeffrey F. Naughton,et al. Anonymization of Set-Valued Data via Top-Down, Local Generalization , 2009, Proc. VLDB Endow..
[40] Charu C. Aggarwal. Privacy and the Dimensionality Curse , 2008, Privacy-Preserving Data Mining.
[41] Jimeng Sun,et al. Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[42] F MokbelMohamed,et al. Trajectory privacy in location-based services and data publication , 2011 .
[43] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[44] Benjamin C. M. Fung,et al. Centralized and Distributed Anonymization for High-Dimensional Healthcare Data , 2010, TKDD.