C4.5: programs for machine learning
C4.5: programs for machine learning
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Mondrian Multidimensional K-Anonymity
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Information disclosure under realistic assumptions: privacy versus optimality
Proceedings of the 14th ACM conference on Computer and communications security
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Mechanism Design via Differential Privacy
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
A learning theory approach to non-interactive database privacy
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Differentially private recommender systems: building privacy into the net
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Data publishing against realistic adversaries
Proceedings of the VLDB Endowment
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
On the geometry of differential privacy
Proceedings of the forty-second ACM symposium on Theory of computing
Interactive privacy via the median mechanism
Proceedings of the forty-second ACM symposium on Theory of computing
Proceedings of the forty-second ACM symposium on Theory of computing
Optimizing linear counting queries under differential privacy
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Towards an axiomatization of statistical privacy and utility
Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Data mining with differential privacy
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Discovering frequent patterns in sensitive data
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
A firm foundation for private data analysis
Communications of the ACM
Boosting the accuracy of differentially private histograms through consistency
Proceedings of the VLDB Endowment
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
Data privacy against composition attack
DASFAA'12 Proceedings of the 17th international conference on Database Systems for Advanced Applications - Volume Part I
The application of differential privacy to health data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Differentially private transit data publication: a case study on the montreal transportation system
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
PrivBasis: frequent itemset mining with differential privacy
Proceedings of the VLDB Endowment
Low-rank mechanism: optimizing batch queries under differential privacy
Proceedings of the VLDB Endowment
Secure distributed framework for achieving ε-differential privacy
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Clustering-oriented privacy-preserving data publishing
Knowledge-Based Systems
Differentially private sequential data publication via variable-length n-grams
Proceedings of the 2012 ACM conference on Computer and communications security
Differentially private projected histograms: construction and use for prediction
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Differential private trajectory protection of moving objects
Proceedings of the Third ACM SIGSPATIAL International Workshop on GeoStreaming
Journal of Biomedical Informatics
Mining frequent graph patterns with differential privacy
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
UMicS: from anonymized data to usable microdata
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Understanding hierarchical methods for differentially private histograms
Proceedings of the VLDB Endowment
Differential privacy based on importance weighting
Machine Learning
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Hi-index | 0.00 |
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ∈-differential privacy provides one of the strongest privacy guarantees and has no assumptions about an adversary's background knowledge. Most of the existing solutions that ensure ∈-differential privacy are based on an interactive model, where the data miner is only allowed to pose aggregate queries to the database. In this paper, we propose the first anonymization algorithm for the non-interactive setting based on the generalization technique. The proposed solution first probabilistically generalizes the raw data and then adds noise to guarantee ∈-differential privacy. As a sample application, we show that the anonymized data can be used effectively to build a decision tree induction classifier. Experimental results demonstrate that the proposed non-interactive anonymization algorithm is scalable and performs better than the existing solutions for classification analysis.