4.6 Article

Differentially Private Publication of Vertically Partitioned Data

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

Slawomir Goryczka et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage

Xi He et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Hardware & Architecture

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility

Yuan Hong et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Artificial Intelligence

Greedy learning of latent tree models for multidimensional clustering

Teng-Fei Liu et al.

MACHINE LEARNING (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Differentially Private High-Dimensional Data Publication via Sampling-Based Inference

Rui Chen et al.

KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2015)

Article Computer Science, Hardware & Architecture

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data

Noman Mohammed et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)

Article Computer Science, Artificial Intelligence

m-Privacy for Collaborative Data Publishing

Slawomir Goryczka et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Interdisciplinary Applications

Quantifying the costs and benefits of privacy-preserving health data publishing

Rashid Hussain Khokhar et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2014)

Article Computer Science, Hardware & Architecture

Anonymity meets game theory: secure data integration with malicious participants

Noman Mohammed et al.

VLDB JOURNAL (2011)

Article Computer Science, Information Systems

Centralized and Distributed Anonymization for High-Dimensional Healthcare Data

Noman Mohammed et al.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2010)

Article Computer Science, Hardware & Architecture

A secure distributed framework for achieving k-anonymity

Wei Jiang et al.

VLDB JOURNAL (2006)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)