C4.5: programs for machine learning
C4.5: programs for machine learning
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Datafly: A System for Providing Anonymity in Medical Data
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Incognito: efficient full-domain K-anonymity
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Template-Based Privacy Preservation in Classification Problems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Personalized privacy preservation
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing sequential releases
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
The VLDB Journal — The International Journal on Very Large Data Bases
Anatomy: simple and effective privacy preservation
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Utility-based anonymization for privacy preservation with less information loss
ACM SIGKDD Explorations Newsletter
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
M-invariance: towards privacy preserving re-publication of dynamic datasets
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Anonymizing Classification Data for Privacy Preservation
IEEE Transactions on Knowledge and Data Engineering
Data & Knowledge Engineering
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
K-anonymization as spatial indexing: toward scalable and incremental anonymization
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Towards optimal k-anonymization
Data & Knowledge Engineering
Anonymity for continuous data publishing
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
An efficient hash-based algorithm for minimal k-anonymity
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
An efficient clustering method for k-anonymization
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Attribute selection in multivariate microaggregation
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
An Empirical Study of Utility Measures for k-Anonymisation
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Protecting the Publishing Identity in Multiple Tuples
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Data Quality in Privacy Preservation for Associative Classification
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Privacy preserving serial data publishing by role composition
Proceedings of the VLDB Endowment
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Does enforcing anonymity mean decreasing data usefulness?
Proceedings of the 4th ACM workshop on Quality of protection
Table summarization with the help of domain lattices
Proceedings of the 17th ACM conference on Information and knowledge management
Towards privacy-preserving integration of distributed heterogeneous data
Proceedings of the 2nd PhD workshop on Information and knowledge management
Information Leakage in Optimal Anonymized and Diversified Data
Information Hiding
L-Diversity Based Dynamic Update for Large Time-Evolving Microdata
AI '08 Proceedings of the 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
A Novel Heuristic Algorithm for Privacy Preserving of Associative Classification
PRICAI '08 Proceedings of the 10th Pacific Rim International Conference on Artificial Intelligence: Trends in Artificial Intelligence
AlphaSum: size-constrained table summarization using value lattices
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
On the comparison of microdata disclosure control algorithms
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Zerber+R: top-k retrieval from a confidential index
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
HIDE: heterogeneous information DE-identification
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-preserving incremental data dissemination
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy protection for RFID data
Proceedings of the 2009 ACM symposium on Applied Computing
Privacy-preserving data publishing for cluster analysis
Data & Knowledge Engineering
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing
Transactions on Data Privacy
On the tradeoff between privacy and utility in data publishing
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing location-based RFID data
C3S2E '09 Proceedings of the 2nd Canadian Conference on Computer Science and Software Engineering
Information Sciences: an International Journal
A multi-objective approach to data sharing with privacy constraints and preference based objectives
Proceedings of the 11th Annual conference on Genetic and evolutionary computation
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
Formal anonymity models for efficient privacy-preserving joins
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
An integrated framework for de-identifying unstructured medical data
Data & Knowledge Engineering
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Proceedings of the 18th ACM conference on Information and knowledge management
Incremental privacy preservation for associative classification
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Transparent anonymization: Thwarting adversaries who know the algorithm
ACM Transactions on Database Systems (TODS)
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Algorithm-safe privacy-preserving data publishing
Proceedings of the 13th International Conference on Extending Database Technology
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Achieving k-anonymity via a density-based clustering method
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Capture inference attacks for K-anonymity with privacy inference logic
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Risk & distortion based K-anonymity
WISA'07 Proceedings of the 8th international conference on Information security applications
Privacy protection on multiple sensitive attributes
ICICS'07 Proceedings of the 9th international conference on Information and communications security
On the complexity of restricted k-anonymity problem
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Allowing privacy protection algorithms to jump out of local optimums: an ordered greed framework
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Privacy-aware location data publishing
ACM Transactions on Database Systems (TODS)
Versatile publishing for privacy preservation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Systematic clustering method for l-diversity model
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
On the identification of property based generalizations in microdata anonymization
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A family of enhanced (L,α)-diversity models for privacy preserving data publishing
Future Generation Computer Systems
Extending l-diversity to generalize sensitive data
Data & Knowledge Engineering
Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data
Proceedings of the VLDB Endowment
ACM Transactions on Database Systems (TODS)
Extended k-anonymity models against sensitive attribute disclosure
Computer Communications
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
The VLDB Journal — The International Journal on Very Large Data Bases
Discord region based analysis to improve data utility of privately published time series
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
FAANST: fast anonymizing algorithm for numerical streaming data
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
PCTA: privacy-constrained clustering-based transaction data anonymization
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Can the Utility of Anonymized Data be Used for Privacy Breaches?
ACM Transactions on Knowledge Discovery from Data (TKDD)
An efficient clustering algorithm for k-anonymisation
Journal of Computer Science and Technology
Privacy preservation for associative classification: an approximation algorithm
International Journal of Business Intelligence and Data Mining
Publishing anonymous survey rating data
Data Mining and Knowledge Discovery
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
On robust and effective k-anonymity in large databases
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
A K-anonymizing approach for preventing link attacks in data publishing
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Priority-Based k-anonymity accomplished by weighted generalisation structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
A semantic information loss metric for privacy preserving publication
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy streamliner: a two-stage approach to improving algorithm efficiency
Proceedings of the second ACM conference on Data and Application Security and Privacy
An information theoretic privacy and utility measure for data sanitization mechanisms
Proceedings of the second ACM conference on Data and Application Security and Privacy
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
Integrating private databases for data analysis
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Towards an anti-inference (k, ℓ)-anonymity model with value association rules
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Hiding emerging patterns with local recoding generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Satisfying privacy requirements: one step before anonymization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Utility-guided Clustering-based Transaction Data Anonymization
Transactions on Data Privacy
On the identity anonymization of high-dimensional rating data
Concurrency and Computation: Practice & Experience
Information based data anonymization for classification utility
Data & Knowledge Engineering
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Detecting dependencies in an anonymized dataset
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy consensus in anonymization systems via game theory
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Clustering-based k-anonymisation algorithms
DEXA'07 Proceedings of the 18th international conference on Database and Expert Systems Applications
Generically extending anonymization algorithms to deal with successive queries
Proceedings of the 21st ACM international conference on Information and knowledge management
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Efficient discovery of de-identification policy options through a risk-utility frontier
Proceedings of the third ACM conference on Data and application security and privacy
Information Sciences: an International Journal
Priority driven k-anonymisation for privacy protection
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Fast clustering-based anonymization approaches with time constraints for data streams
Knowledge-Based Systems
The hardness of (ε, m)-anonymity
WAIM'13 Proceedings of the 14th international conference on Web-Age Information Management
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A general framework for privacy preserving data publishing
Knowledge-Based Systems
Journal of Computer Security
Hi-index | 0.00 |
Releasing person-specific data in its most specific state poses a threat to individual privacy. This paper presents a practical and efficient algorithm for determining a generalized version of data that masks sensitive information and remains useful for modelling classification. The generalization of data is implemented by specializing or detailing the level of information in a top-down manner until a minimum privacy requirement is violated. This top-down specialization is natural and efficient for handling both categorical and continuous attributes. Our approach exploits the fact that data usually contains redundant structures forclassification. While generalization may eliminate some structures, other structures emerge to help. Our results show that quality of classification can be preserved even for highly restrictive privacy requirements. This work has great applicability to both public and private sectors that share information for mutual benefits and productivity.