On the Reconstruction Method For Negative Surveys with Application to Education Surveys
暂无分享,去创建一个
Hao Jiang | Li Ni | Wenjian Luo | Bei Hua | Hao Jiang | Bei Hua | Wenjian Luo | Li Ni
[1] Lihua Yue,et al. Reconstructing Positive Surveys from Negative Surveys with Background Knowledge , 2016, DMBD.
[2] Fernando Esponda,et al. Everything That is Not Important: Negative Databases , 2008 .
[3] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[4] Stephanie Forrest,et al. A Relational Algebra for Negative Databases , 2007 .
[5] Wenjian Luo,et al. Estimating positive surveys from negative surveys , 2013 .
[6] Stephanie Forrest,et al. Reconstructing Spatial Distributions from Anonymized Locations , 2012, 2012 IEEE 28th International Conference on Data Engineering Workshops.
[7] Hao Jiang,et al. On Location and Trace Privacy of the Moving Object Using the Negative Survey , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[8] Benjamin Edwards,et al. Enhancing privacy in participatory sensing applications with multidimensional data , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[9] Kaoru Sezaki,et al. Limited Negative Surveys: Privacy-preserving participatory sensing , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).
[10] Stephanie Forrest,et al. Anonymous Data Collection in Sensor Networks , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[11] Víctor M. Guerrero,et al. Surveys with negative questions for sensitive items , 2009 .
[12] Gail Salaway,et al. The ECAR Study of Undergraduate Students and Information Technology, 2008 , 2007 .
[13] Wenjian Luo,et al. SvdNPD: a negative data publication method based on the sensitive value distribution , 2015, 2015 International Workshop on Artificial Immune Systems (AIS).
[14] Soumya Banerjee,et al. Modular RADAR: An Immune System Inspired Search and Response Strategy for Distributed Systems , 2010, ICARIS.
[15] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[16] Lars Kulik,et al. Privacy-aware collection of aggregate spatial data , 2011, Data Knowl. Eng..
[17] Paul Helman,et al. Protecting data privacy through hard-to-reverse negative databases , 2007, International Journal of Information Security.
[18] F. Esponda. Everything that is not important: Negative databases [Research Frontier] , 2008, IEEE Computational Intelligence Magazine.
[19] Narendra Karmarkar,et al. A new polynomial-time algorithm for linear programming , 1984, STOC '84.
[20] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[21] Wenjian Luo,et al. Fast searching optimal negative surveys , 2014 .
[22] Wenjian Luo,et al. On the dependable level of the negative survey , 2014 .
[23] Víctor M. Guerrero,et al. A Statistical Approach to Provide Individualized Privacy for Surveys , 2016, PloS one.
[24] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[25] Hao Jiang,et al. Rating Credits of Online Merchants Using Negative Ranks , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.
[26] Paul Helman,et al. On-line Negative Databases , 2005, Int. J. Unconv. Comput..
[27] Fernando Esponda. Negative Surveys , 2006 .
[28] Paul Helman,et al. Negative representations of information , 2009, International Journal of Information Security.