Differential Privacy Preserving Algorithm For Data Anonymization
暂无分享,去创建一个
[1] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] S. Reiss,et al. Data-swapping: A technique for disclosure control , 1982 .
[4] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[5] P. Diaconis,et al. Algebraic algorithms for sampling from conditional distributions , 1998 .
[6] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[7] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[8] A. Dobra. Statistical tools for disclosure limitation in multi-way contingency tables , 2002 .
[9] George T. Duncan,et al. Obtaining Information while Preserving Privacy: A Markov Perturbation Method for Tabular Data , 1997 .
[10] Hoeteck Wee,et al. Toward Privacy in Public Databases , 2005, TCC.
[11] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[12] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[13] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[14] Joseph Y. Halpern,et al. From Statistical Knowledge Bases to Degrees of Belief , 1996, Artif. Intell..
[15] Dan Suciu,et al. A formal analysis of information disclosure in data exchange , 2004, SIGMOD '04.
[16] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[17] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.