|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 425 occurrences of 196 keywords
|
|
|
Results
Found 1410 publication records. Showing 1410 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
104 | Ramaswamy Ramaswamy, Tilman Wolf |
High-speed prefix-preserving IP address anonymization for passive measurement systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(1), pp. 26-39, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymization, network measurement |
99 | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 323-324, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy/utility tradeoff, log anonymization, anonymization, privacy-preserving, data sharing, network intrusion detection systems |
97 | Vidar Evenrud Seeberg, Slobodan Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 385-390, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
97 | Matthew Roughan |
Public review for the devil and packet trace anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 36(1), pp. 27-28, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
78 | Graham Cormode, Divesh Srivastava |
Anonymized data: generation, models, usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 1015-1018, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, anonymization, uncertain databases |
75 | Shantanu Gattani, Thomas E. Daniels |
Reference models for network data anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 41-48, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trace sanitization, formal model |
75 | Tønnes Brekne, André Årnes, Arne Øslebø |
Anonymization of IP Traffic Monitoring Data: Attacks on Two Prefix-Preserving Anonymization Schemes and Some Proposed Remedies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers, pp. 179-196, 2005, Springer, 3-540-34745-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Gabriel Ghinita, Panagiotis Karras, Panos Kalnis, Nikos Mamoulis |
A framework for efficient data anonymization under privacy and accuracy constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 34(2), pp. 9:1-9:47, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy, anonymity |
73 | Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins |
A survey of state-of-the-art in anonymity metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 31-40, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network data, privacy, metrics, anonymity, communication networks |
68 | Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao |
Towards publishing recommendation data with predictive anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 24-35, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
clustering, privacy, prediction, anonymization, sparsity |
68 | Brian Thompson, Danfeng Yao |
The union-split algorithm and cluster-based anonymization of social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 218-227, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
graph anonymization, social networks, clustering algorithms, social role |
68 | Justin King, Kiran Lakkaraju, Adam J. Slagell |
A taxonomy and adversarial model for attacks against network log anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1286-1293, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
network logs, anonymization, taxonomy, adversarial model |
66 | Ravi Kumar 0001, Jasmine Novak, Bo Pang 0001, Andrew Tomkins |
On anonymizing query logs via token-based hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 629-638, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash-based anonymization, privacy, query logs |
61 | David A. Maltz, Jibin Zhan, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford, Geoffrey G. Xie, Hui Zhang 0001 |
Structure preserving anonymization of router configuration data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 27(3), pp. 349-358, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Victor Muntés-Mulero, Jordi Nin |
Privacy and anonymization for very large datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 2117-2118, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficient privacy-enhancing technologies, efficient statistical disclosure control, privacy preserving data mining for large data sets |
61 | Qianli Zhang, Jilong Wang 0001, Xing Li 0001 |
On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 177-188, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Jian Xu 0015, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, Baile Shi, Ada Wai-Chee Fu |
Utility-based anonymization for privacy preservation with less information loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 8(2), pp. 21-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
local recoding, data mining, utility, privacy preservation, k-anonymity |
61 | Matús Harvan, Jürgen Schönwälder |
Prefix- and Lexicographical-order-preserving IP Address Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pp. 519-526, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Jian Xu 0015, Wei Wang 0009, Jian Pei, Xiaoyuan Wang, Baile Shi, Ada Wai-Chee Fu |
Utility-based anonymization using local recoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 785-790, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
local recoding, data mining, utility, privacy preservation, k-anonymity |
61 | Jun (Jim) Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon |
Prefix-Preserving IP Address Anonymization: Measurement-Based Security Evaluation and a New Cryptography-Based Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 10th IEEE International Conference on Network Protocols (ICNP 2002), 12-15 November 2002, Paris, France, Proceedings, pp. 280-289, 2002, IEEE Computer Society, 0-7695-1856-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
59 | Benjamin C. M. Fung, Ke Wang 0001, Philip S. Yu |
Anonymizing Classification Data for Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 19(5), pp. 711-725, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, classification, integrity, anonymity, data sharing, Privacy protection |
56 | Xiaokui Xiao, Guozhang Wang, Johannes Gehrke |
Interactive anonymization of sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 1051-1054, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
l-diversity, data anonymization |
56 | Masayoshi Teraguchi, Issei Yoshida, Naohiko Uramoto |
Rule-based XML Mediation for Data Validation and Privacy Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 21-28, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML Mediation, Industry-specific specification, privacy anonymization, data validation |
56 | Martin Burkhart, Daniela Brauckhoff, Martin May, Elisa Boschi |
The risk-utility tradeoff for IP address truncation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 23-30, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, anonymization, anomaly detection |
56 | Jeffrey C. Mogul, Martin F. Arlitt |
SC2D: an alternative to trace anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, MineNet 2006, Pisa, Italy, September 15, 2006, pp. 323-328, 2006, ACM, 1-59593-569-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trace anonymization |
54 | Wai Kit Wong, Nikos Mamoulis, David Wai-Lok Cheung |
Non-homogeneous generalization in privacy preserving data publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 747-758, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
non-homogeneous generalization, privacy, anonymization |
54 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
On the comparison of microdata disclosure control algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 240-251, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymization bias, performance evaluation, data privacy |
54 | Jon M. Kleinberg |
Challenges in mining social network data: processes, privacy, and paradoxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007, pp. 4-5, 2007, ACM, 978-1-59593-609-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy in data mining, data mining, social networks, anonymization, diffusion of innovations |
50 | Aristides Gionis, Tamir Tassa |
k-Anonymization with Minimal Loss of Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(2), pp. 206-219, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis |
Deep packet anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 16-21, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Mohammad-Reza Zare-Mirakabad, Aman Jantan, Stéphane Bressan |
Clustering-Based Frequency l-Diversity Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 159-168, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
50 | Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan 0001 |
Workload-aware anonymization techniques for large-scale datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 33(3), pp. 17:1-17:47, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, performance, privacy, scalability, Databases, anonymity |
50 | Tiancheng Li, Ninghui Li |
Injector: Mining Background Knowledge for Data Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 446-455, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Srivatsava Ranjit Ganta, Raj Acharya |
Adaptive data anonymization against information fusion based privacy attacks on enterprise data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1075-1076, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham |
Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 991-994, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Heechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya |
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDM ![In: 9th International Conference on Mobile Data Management (MDM 2008), Beijing, China, April 27-30, 2008, pp. 73-80, 2008, IEEE, 978-0-7695-3154-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Indexing, Anonymity, Location Based Services, k-anonymity |
50 | Jun-Lin Lin, Meng-Cheng Wei |
An efficient clustering method for k-anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 46-50, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
clustering, anonymity, greedy algorithm |
50 | Aristides Gionis, Tamir Tassa |
k -Anonymization with Minimal Loss of Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2007, 15th Annual European Symposium, Eilat, Israel, October 8-10, 2007, Proceedings, pp. 439-450, 2007, Springer, 978-3-540-75519-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Weijia Yang, Shangteng Huang |
k -Anonymization Without Q-S Associations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM ![In: Advances in Data and Web Management, Joint 9th Asia-Pacific Web Conference, APWeb 2007, and 8th International Conference, on Web-Age Information Management, WAIM 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 753-764, 2007, Springer, 978-3-540-72483-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Ruoming Pang, Mark Allman, Vern Paxson, Jason Lee 0001 |
The devil and packet trace anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 36(1), pp. 29-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan 0001 |
Workload-aware anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA, August 20-23, 2006, pp. 277-286, 2006, ACM, 1-59593-339-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
data recoding, privacy, anonymity, predictive modeling |
50 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Towards a More Reasonable Generalization Cost Metric for K-Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Flexible and Efficient Information Handling, 23rd British National Conference on Databases, BNCOD 23, Belfast, Northern Ireland, UK, July 18-20, 2006, Proceedings, pp. 258-261, 2006, Springer, 3-540-35969-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Qianli Zhang, Xing Li |
An IP Address Anonymization Scheme with Multiple Access Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 793-802, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Roberto J. Bayardo Jr., Rakesh Agrawal 0001 |
Data Privacy through Optimal k-Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 217-228, 2005, IEEE Computer Society, 0-7695-2285-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang |
Anonymizing moving objects: how to hide a MOB in a crowd? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 72-83, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Srivatsava Ranjit Ganta, Raj Acharya |
On breaching enterprise data privacy through adversarial information fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 246-249, 2008, IEEE Computer Society, 978-1-4244-2161-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Gabriele Gianini, Ernesto Damiani |
Cloaking games in location based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 61-70, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
game theory, location based services, k-anonymity |
48 | Mehmet Ercan Nergiz, Maurizio Atzori, Chris Clifton |
Hiding the presence of individuals from shared databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 665-676, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
delta presence, privacy, k-anonymity, medical databases |
48 | Josep Domingo-Ferrer, Vicenç Torra |
Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 11(2), pp. 195-212, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
microdata privacy, k-anonymity, database security, microaggregation |
44 | Xiaokui Xiao, Yufei Tao 0001 |
Dynamic anonymization: accurate statistical analysis with privacy preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 107-120, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
m-invariance, dynamic anonymization, privacy, statistical database |
44 | Kimberly C. Claffy |
"Show me the data": resolving challenges in network data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-22, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protected data-sharing, anonymization |
44 | Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier |
A generic approach for healthcare data anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004, pp. 31-32, 2004, ACM, 1-58113-968-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
inferences in databases, privacy, anonymization, smartcards |
44 | David A. Maltz, Jibin Zhan, Geoffrey G. Xie, Hui Zhang 0001, Gísli Hjálmtýsson, Albert G. Greenberg, Jennifer Rexford |
Structure preserving anonymization of router configuration data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, IMC 2004, Taormina, Sicily, Italy, October 25-27, 2004, pp. 239-244, 2004, ACM, 1-58113-821-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
router configuration, security, data anonymization |
44 | Ruoming Pang, Vern Paxson |
A high-level programming environment for packet trace anonymization and transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 25-29, 2003, Karlsruhe, Germany, pp. 339-351, 2003, ACM, 1-58113-735-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
packet trace, internet, privacy, measurement, anonymization, transformation, network intrusion detection |
42 | Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith |
Composition attacks and auxiliary information in data privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 265-273, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adversarial attacks, privacy, anonymization |
38 | Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri |
Effective anonymization of query logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, CIKM 2009, Hong Kong, China, November 2-6, 2009, pp. 1465-1468, 2009, ACM, 978-1-60558-512-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy |
38 | Pawel Jurczyk, Li Xiong 0001 |
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 191-207, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Igor Margasinski |
A Parallelism-Based Approach to Network Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 28-43, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous network architectures, privacy, anonymity, Communication system security |
38 | Bin Zhou 0002, Jian Pei, Wo-Shun Luk |
A brief survey on anonymization techniques for privacy preserving publishing of social network data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 10(2), pp. 12-22, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Gabriel Ghinita, Yufei Tao 0001, Panos Kalnis |
On the Anonymization of Sparse High-Dimensional Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 715-724, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Aristides Gionis, Arnon Mazza, Tamir Tassa |
k-Anonymization Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 744-753, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Jun-Lin Lin, Meng-Cheng Wei, Chih-Wen Li, Kuo-Chiang Hsieh |
A Hybrid Method for k-Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 385-390, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Kun Liu 0001, Evimaria Terzi |
Towards identity anonymization on graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 93-106, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
degree sequence, dynamic programming, anonymity |
38 | Mehmet Ercan Nergiz, Maurizio Atzori, Yücel Saygin |
Towards trajectory anonymization: a generalization-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 52-61, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, k-anonymity, spatio temporal |
38 | Arvind Narayanan, Vitaly Shmatikov |
Robust De-anonymization of Large Sparse Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 111-125, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Anonymity, Attack |
38 | Elisa Boschi |
Legal requirements and issues in network traffic data protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 19-20, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data protection law, legal requirements, network traffic data |
38 | Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li |
Efficient k -Anonymization Using Clustering Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 188-200, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Sven Ubik, Petr Zejdl, Jiri Halak |
Real-time anonymization in passive network monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: Third International Conference on Networking and Services (ICNS 2007), June 19-25, 2007, Athens, Greece, pp. 100, 2007, IEEE Computer Society, 978-0-7695-2858-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Zhouxuan Teng, Wenliang Du |
Comparisons of K-Anonymization and Randomization Schemes under Linking Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 1091-1096, 2006, IEEE Computer Society, 0-7695-2701-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Sheng Zhong 0002, Zhiqiang Yang, Rebecca N. Wright |
Privacy-enhancing k-anonymization of customer data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, USA, pp. 139-147, 2005, ACM, 1-59593-062-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Ali Inan, Murat Kantarcioglu, Elisa Bertino |
Using Anonymized Data for Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China, pp. 429-440, 2009, IEEE Computer Society, 978-0-7695-3545-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Noman Mohammed, Benjamin C. M. Fung, Patrick C. K. Hung, Cheuk-kwong Lee |
Anonymizing healthcare data: a case study on the blood transfusion service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1285-1294, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
classification, privacy, anonymity, healthcare |
36 | Amirreza Masoumzadeh 0001, James Joshi, Hassan A. Karimi |
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings, pp. 464-467, 2009, ACM, 978-1-60558-649-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, anonymity, LBS, k-anonymity |
36 | Xiaojun Ye, Lei Jin, Bin Li |
A Multi-Dimensional K-Anonymity Model for Hierarchical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 327-332, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Gerardo Canfora, Corrado Aaron Visaggio |
Does enforcing anonymity mean decreasing data usefulness? ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 4th ACM Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008, pp. 15-22, 2008, ACM, 978-1-60558-321-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data usefulness, anonymity, data privacy |
36 | Bhuvan Bamba, Ling Liu 0001, Péter Pesti, Ting Wang 0006 |
Supporting anonymous location queries in mobile environments with privacygrid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 237-246, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
location privacy, k-anonymity, l-diversity |
36 | Barbara Poblete, Myra Spiliopoulou, Ricardo A. Baeza-Yates |
Website Privacy Preservation for Query Log Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PinKDD ![In: Privacy, Security, and Trust in KDD, First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers, pp. 80-96, 2007, Springer, 978-3-540-78477-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Zude Li, Guoqiang Zhan, Xiaojun Ye |
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 883-893, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Peter Ruppel, Georg Treu, Axel Küpper, Claudia Linnhoff-Popien |
Anonymous User Tracking for Location-Based Community Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LoCA ![In: Location- and Context-Awareness, Second International Workshop, LoCA 2006, Dublin, Ireland, May 10-11, 2006, Proceedings, pp. 116-133, 2006, Springer, 3-540-34150-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan 0001 |
Incognito: Efficient Full-Domain K-Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, June 14-16, 2005, pp. 49-60, 2005, ACM, 1-59593-060-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Xiaochun Yang 0001, Xiangyu Liu, Bin Wang 0015, Ge Yu 0001 |
A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 627-636, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Neal Leavitt |
Anonymization Technology Takes a High Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(11), pp. 15-18, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymization technology, Security and privacy |
32 | Hongwei Tian, Weining Zhang |
Extending l-Diversity for Better Data Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, USA, 27-29 April 2009, pp. 461-466, 2009, IEEE Computer Society, 978-0-7695-3596-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Algorithm, Anonymization, Generalization, Experiments, Data Privacy |
31 | Divesh Srivastava, Suresh Venkatasubramanian |
Information theory for data management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 1255-1256, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data integration, entropy, estimation, mutual information, database design, kl divergence, data anonymization |
31 | Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh |
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Knowl. Discov. Data ![In: ACM Trans. Knowl. Discov. Data 2(3), pp. 13:1-13:44, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymization, sampling, matching, correlation, frequent itemsets, bipartite graphs, belief function, hacker, prior knowledge, Disclosure risk |
31 | Stefan Rass, Simone Fuchs, Martin Schaffer, Kyandoghere Kyamakya |
How to protect privacy in floating car data systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vehicular Ad Hoc Networks ![In: Proceedings of the Fifth International Workshop on Vehicular Ad Hoc Networks, VANET 2008, San Francisco, California, USA, September 15, 2008, pp. 17-22, 2008, ACM, 978-1-60558-191-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, anonymization, pseudonyms, discrete logarithm problem |
31 | Jiexing Li, Yufei Tao 0001, Xiaokui Xiao |
Preservation of proximity privacy in publishing numerical sensitive data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 473-486, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
(?, m)-anonymity, privacy, anonymization, numeric |
31 | Chi-Yin Chow, Mohamed F. Mokbel, Tian He 0001 |
Tinycasper: a privacy-preserving aggregate location monitoring system in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 1307-1310, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
aggregate location monitoring systems, aggregate query processing, wireless sensor networks, location privacy, location anonymization |
31 | David Rebollo-Monedero, Jordi Forné, Josep Domingo-Ferrer |
From t-Closeness to PRAM and Noise Addition Via Information Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy in Statistical Databases ![In: Privacy in Statistical Databases, UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings, pp. 100-112, 2008, Springer, 978-3-540-87470-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
t-closeness, Microdata anonymization, Information theory, PRAM, Rate distortion theory, Noise addition |
31 | Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg |
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 181-190, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy in data mining, social networks, anonymization |
31 | Mark Allman, Vern Paxson |
Issues and etiquette concerning use of shared measurement data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 135-140, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymization, data sharing |
28 | Andrey V. Borisov, Alexey V. Bosov, Alexei V. Ivanov |
Application of Computer Simulation to the Anonymization of Personal Data: Synthesis-Based Anonymization Model and Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Program. Comput. Softw. ![In: Program. Comput. Softw. 49(5), pp. 388-400, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Felix Rosberg, Eren Erdal Aksoy, Cristofer Englund, Fernando Alonso-Fernandez |
FIVA: Facial Image and Video Anonymization and Anonymization Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.04228, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Felix Rosberg, Eren Erdal Aksoy, Cristofer Englund, Fernando Alonso-Fernandez |
FIVA: Facial Image and Video Anonymization and Anonymization Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV (Workshops) ![In: IEEE/CVF International Conference on Computer Vision, ICCV 2023 - Workshops, Paris, France, October 2-6, 2023, pp. 362-371, 2023, IEEE, 979-8-3503-0744-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Ildikó Pilán, Pierre Lison, Lilja Øvrelid, Anthi Papadopoulou, David Sánchez 0001, Montserrat Batet |
The Text Anonymization Benchmark (TAB): A Dedicated Corpus and Evaluation Framework for Text Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.00443, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Ildikó Pilán, Pierre Lison, Lilja Øvrelid, Anthi Papadopoulou, David Sánchez 0001, Montserrat Batet |
The Text Anonymization Benchmark (TAB): A Dedicated Corpus and Evaluation Framework for Text Anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Linguistics ![In: Comput. Linguistics 48(4), pp. 1053-1101, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Kangyi Ding, Teng Hu, Xiaolei Liu 0001, Weina Niu, Yanping Wang, Xiaosong Zhang 0001 |
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: IEEE International Conference on Multimedia and Expo, ICME 2022, Taipei, Taiwan, July 18-22, 2022, pp. 1-6, 2022, IEEE, 978-1-6654-8563-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Huandong Wang, Yong Li 0008, Chen Gao, Gang Wang 0011, Xiaoming Tao, Depeng Jin |
Anonymization and De-Anonymization of Mobility Trajectories: Dissecting the Gaps Between Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 20(3), pp. 796-815, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Sean Chester, Bruce M. Kapron, Gautam Srivastava 0001, Venkatesh Srinivasan 0001, Alex Thomo |
Anonymization and De-anonymization of Social Network Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Social Network Analysis and Mining. 2nd Ed. ![In: Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018, Springer. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yuchen Zhao, Isabel Wagner |
POSTER: Evaluating Privacy Metrics for Graph Anonymization and De-anonymization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018, pp. 817-819, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1410 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|