Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Privacy: A Machine Learning View
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 11th ACM conference on Computer and communications security
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Checking for k-anonymity violation by views
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Spatio-temporal data reduction with deterministic error bounds
The VLDB Journal — The International Journal on Very Large Data Bases
Utility-based anonymization using local recoding
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Probabilistic privacy analysis of published views
Proceedings of the 5th ACM workshop on Privacy in electronic society
Enabling the 21st century health care information technology revolution
Communications of the ACM - Spam and the ongoing battle for the inbox
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
Approximate algorithms for K-anonymity
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
"I know what you did last summer": query logs and user privacy
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Fast data anonymization with low information loss
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Better bug reporting with better privacy
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Guest editorial: Recent advances in preserving privacy when mining data
Data & Knowledge Engineering
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
An efficient hash-based algorithm for minimal k-anonymity
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
BSGI: An Effective Algorithm towards Stronger l-Diversity
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Vanity fair: privacy in querylog bundles
Proceedings of the 17th ACM conference on Information and knowledge management
Beyond User-to-User Access Control for Online Social Networks
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Continuous privacy preserving publishing of data streams
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
The union-split algorithm and cluster-based anonymization of social networks
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A brief survey on anonymization techniques for privacy preserving publishing of social network data
ACM SIGKDD Explorations Newsletter
Information Sciences: an International Journal
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy-Aware Location Database Service for Granular Queries
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Proceedings of the 18th ACM conference on Information and knowledge management
Walking in the crowd: anonymizing trajectory data for pattern analysis
Proceedings of the 18th ACM conference on Information and knowledge management
Effective anonymization of query logs
Proceedings of the 18th ACM conference on Information and knowledge management
k-automorphism: a general framework for privacy preserving network publication
Proceedings of the VLDB Endowment
Beyond k-Anonymity: A Decision Theoretic Framework for Assessing Privacy Risk
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Towards publishing recommendation data with predictive anonymization
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
A formal model of data privacy
PSI'06 Proceedings of the 6th international Andrei Ershov memorial conference on Perspectives of systems informatics
K-anonymization with minimal loss of information
ESA'07 Proceedings of the 15th annual European conference on Algorithms
Discovering private trajectories using background information
Data & Knowledge Engineering
The k-anonymity problem is hard
FCT'09 Proceedings of the 17th international conference on Fundamentals of computation theory
On the complexity of restricted k-anonymity problem
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymization of moving objects databases by clustering and perturbation
Information Systems
Approximate algorithms with generalizing attribute values for k-anonymity
Information Systems
Microdata protection through approximate microaggregation
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving publishing microdata with full functional dependencies
Data & Knowledge Engineering
Privacy-preserving data sharing in cloud computing
Journal of Computer Science and Technology
Anonymizing Set-Valued Social Data
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
A user-oriented anonymization mechanism for public data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Parameterized complexity of k-anonymity: hardness and tractability
IWOCA'10 Proceedings of the 21st international conference on Combinatorial algorithms
Differentially private data cubes: optimizing noise sources and consistency
Proceedings of the 2011 ACM SIGMOD International Conference on Management of data
Anonymizing shortest paths on social network graphs
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Distributed privacy preserving data collection
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications - Volume Part I
Anonymizing binary and small tables is hard to approximate
Journal of Combinatorial Optimization
Privacy-preserving social network publication against friendship attacks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Trajectory anonymity in publishing personal mobility data
ACM SIGKDD Explorations Newsletter
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
An approximate microaggregation approach for microdata protection
Expert Systems with Applications: An International Journal
Weak k-anonymity: a low-distortion model for protecting privacy
ISC'06 Proceedings of the 9th international conference on Information Security
Preserving privacy on the searchable internet
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
The relationship between reasoning about privacy and default logics
LPAR'05 Proceedings of the 12th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Privacy-preserving publishing data with full functional dependencies
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
ICDT'05 Proceedings of the 10th international conference on Database Theory
Measuring query privacy in location-based services
Proceedings of the second ACM conference on Data and Application Security and Privacy
An information theoretic privacy and utility measure for data sanitization mechanisms
Proceedings of the second ACM conference on Data and Application Security and Privacy
Finding all maximally-matchable edges in a bipartite graph
Theoretical Computer Science
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Viewpoints on emergent semantics
Journal on Data Semantics VI
Beyond k-anonymity: a decision theoretic framework for assessing privacy risk
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A spatial cloaking framework based on range search for nearest neighbor search
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Anonymizing transaction data by integrating suppression and generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
Differential privacy in data publication and analysis
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy preservation of user history graph
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Injecting uncertainty in graphs for identity obfuscation
Proceedings of the VLDB Endowment
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
k-anonymity-based horizontal fragmentation to preserve privacy in data outsourcing
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy-preserving trajectory data publishing by local suppression
Information Sciences: an International Journal
Improved anonymity for key-trees
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Efficient and accurate strategies for differentially-private sliding window queries
Proceedings of the 16th International Conference on Extending Database Technology
Practical differential privacy via grouping and smoothing
Proceedings of the VLDB Endowment
Parameterized complexity of k-anonymity: hardness and tractability
Journal of Combinatorial Optimization
An efficient and robust privacy protection technique for massive streaming choice-based information
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Incremental processing and indexing for k, e-anonymisation
International Journal of Information and Computer Security
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Automatic anonymous fingerprinting of text posted on social networking services
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Enhance biometric database privacy: defining privacy-preserving drawer size standard for the setbase
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Anonymizing social networks: A generalization approach
Computers and Electrical Engineering
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
The effect of homogeneity on the computational complexity of combinatorial data anonymization
Data Mining and Knowledge Discovery
The l-Diversity problem: Tractability and approximability
Theoretical Computer Science
Towards practical private processing of database queries over public data
Distributed and Parallel Databases
Structure-aware graph anonymization
Web Intelligence and Agent Systems
Journal of Computer Security
K-anonymous path privacy on social graphs
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology
Hi-index | 0.00 |