4.7 Article

Survey on Improving Data Utility in Differentially Private Sequential Data Publishing

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning

Tao Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Automation & Control Systems

Efficient privacy-preserving classification construction model with differential privacy technology

Lin Zhang et al.

JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS (2017)

Article Computer Science, Artificial Intelligence

CTS-DP: Publishing correlated time-series data via differential privacy

Hao Wang et al.

KNOWLEDGE-BASED SYSTEMS (2017)

Article Computer Science, Information Systems

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Jie Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Information Systems

The Optimal Noise-Adding Mechanism in Differential Privacy

Quan Geng et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Computer Science, Theory & Methods

On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems

Xinyu Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Information Systems

FakeMask: A Novel Privacy Preserving Approach for Smartphones

Lichen Zhang et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Review Computer Science, Information Systems

Edge Computing: Vision and Challenges

Weisong Shi et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Article Computer Science, Information Systems

FakeMask: A Novel Privacy Preserving Approach for Smartphones

Lichen Zhang et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Artificial Intelligence

A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures

Zhijiang Chen et al.

BIG DATA RESEARCH (2016)

Article Computer Science, Information Systems

Differential Privacy in the Wild: A tutorial on current practices & open challenges

Ashwin Machanavajjhala et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Differential Privacy of Big Data: An Overview

Xiaoming Yao et al.

2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) (2016)

Proceedings Paper Computer Science, Software Engineering

INCEPTION: Incentivizing Privacy-Preserving Data Aggregation for Mobile Crowd Sensing Systems

Haiming Jin et al.

MOBIHOC '16: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

The Complexity of Computing the Optimal Composition of Differential Privacy

Jack Murtagh et al.

THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I (2016)

Article Computer Science, Information Systems

Optimizing Batch Linear Queries under Exact and Approximate Differential Privacy

Ganzhao Yuan et al.

ACM TRANSACTIONS ON DATABASE SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

A novel temporal perturbation based privacy-preserving scheme for real-time monitoring systems

Xinyu Yang et al.

COMPUTER NETWORKS (2015)

Article Engineering, Electrical & Electronic

De-Anonymizing and Countermeasures in Anonymous Communication Networks

Ming Yang et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Hardware & Architecture

Time-Series Pattern Based Effective Noise Generation for Privacy Protection on Cloud

Gaofeng Zhang et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Theory & Methods

Correlated Differential Privacy: Hiding Information in Non-IID Data Set

Tianqing Zhu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Theory & Methods

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

A Review of Differential Privacy in Individual Data Release

Jun Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Hardware & Architecture

The matrix mechanism: optimizing linear counting queries under differential privacy

Chao Li et al.

VLDB JOURNAL (2015)

Article Computer Science, Information Systems

A Review of Differential Privacy in Individual Data Release

Jun Wang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Information Systems

The internet of things: a survey

Shancang Li et al.

INFORMATION SYSTEMS FRONTIERS (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Differentially Private High-Dimensional Data Publication via Sampling-Based Inference

Rui Chen et al.

KDD'15: PROCEEDINGS OF THE 21ST ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (2015)

Article Computer Science, Hardware & Architecture

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

Qinghua Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)

Article Computer Science, Artificial Intelligence

An Adaptive Approach to Real-Time Aggregate Monitoring with Differential Privacy

Liyue Fan et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Artificial Intelligence

Data Mining with Big Data

Xindong Wu et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Theory & Methods

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud

Xuyun Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Differentially Private Event Sequences over Infinite Streams

Georgios Kellaris et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2014)

Article Computer Science, Artificial Intelligence

Supporting Pattern-Preserving Anonymization for Time-Series Data

Lidan Shou et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2013)

Article Computer Science, Information Systems

Optimal data-independent noise for differential privacy

Jordi Soria-Comas et al.

INFORMATION SCIENCES (2013)

Article Multidisciplinary Sciences

Unique in the Crowd: The privacy bounds of human mobility

Yves-Alexandre de Montjoye et al.

SCIENTIFIC REPORTS (2013)

Article Computer Science, Information Systems

Practical Differential Privacy via Grouping and Smoothing

Georgios Kellaris et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2013)

Article Computer Science, Theory & Methods

The Algorithmic Foundations of Differential Privacy

Cynthia Dwork et al.

FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)

Article Computer Science, Information Systems

Understanding Hierarchical Methods for Differentially Private Histograms

Wahbeh Qardaji et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2013)

Article Computer Science, Hardware & Architecture

A context-aware scheme for privacy-preserving location-based services

Aniket Pingley et al.

COMPUTER NETWORKS (2012)

Article Computer Science, Artificial Intelligence

Publishing Search Logs-A Comparative Study of Privacy Guarantees

Michaela Goetz et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)

Article Computer Science, Information Systems

The Digital Marauder's Map: A WiFi Forensic Positioning Tool

Xinwen Fu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Hardware & Architecture

A New Cell-Counting-Based Attack Against Tor

Zhen Ling et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2012)

Article Computer Science, Theory & Methods

UNIVERSALLY UTILITY-MAXIMIZING PRIVACY MECHANISMS

Arpita Ghosh et al.

SIAM JOURNAL ON COMPUTING (2012)

Article Computer Science, Information Systems

An Adaptive Mechanism for Accurate Query Answering under Differential Privacy

Chao Li et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2012)

Proceedings Paper Computer Science, Theory & Methods

Differentially Private Spatial Decompositions

Graham Cormode et al.

2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE) (2012)

Proceedings Paper Computer Science, Artificial Intelligence

Differentially Private Histogram Publishing through Lossy Compression

Gergely Acs et al.

12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012) (2012)

Article Computer Science, Information Systems

PDA: Privacy-Preserving Data Aggregation for Information Collection

Wenbo He et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2011)

Article Computer Science, Artificial Intelligence

Differential Privacy via Wavelet Transforms

Xiaokui Xiao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)

Article Computer Science, Software Engineering

A survey on privacy in mobile participatory sensing applications

Delphine Christin et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2011)

Article Computer Science, Theory & Methods

Privacy-Preserving Data Publishing: A Survey of Recent Developments

Benjamin C. M. Fung et al.

ACM COMPUTING SURVEYS (2010)

Article Computer Science, Hardware & Architecture

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures

Wei Yu et al.

IEEE TRANSACTIONS ON COMPUTERS (2010)

Article Computer Science, Theory & Methods

Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation

Keke Chen et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)

Article Computer Science, Theory & Methods

An Invisible Localization Attack to Internet Threat Monitors

Wei Yu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)

Article Computer Science, Information Systems

Calibrating noise to sensitivity in private data analysis

Cynthia Dwork et al.

THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)