Privacy-preserving data publishing

BC Chen, D Kifer, K LeFevre… - … and Trends® in …, 2009 - nowpublishers.com
Privacy is an important issue when one wants to make use of data that involves individuals'
sensitive information. Research on protecting the privacy of individuals and the …

Attacks on privacy and deFinetti's theorem

D Kifer - Proceedings of the 2009 ACM SIGMOD International …, 2009 - dl.acm.org
In this paper we present a method for reasoning about privacy using the concepts of
exchangeability and deFinetti's theorem. We illustrate the usefulness of this technique by …

[PDF][PDF] Benchmarking for keyword extraction methodologies in maintenance work orders

T Sexton, M Hodkiewicz… - Proceedings of the …, 2018 - pdfs.semanticscholar.org
Maintenance has largely remained a human-knowledge centered activity, with the primary
records of activity being textbased maintenance work orders (MWOs). However, the bulk of …

Designing statistical privacy for your data

A Machanavajjhala, D Kifer - Communications of the ACM, 2015 - dl.acm.org
Designing statistical privacy for your data Page 1 58 COMMUNICATIONS OF THE ACM |
MARCH 2015 | VOL. 58 | NO. 3 contributed articles DOI:10.1145/2660766 Preparing data for …

Hiding outliers into crowd: Privacy-preserving data publishing with outliers

HW Wang, R Liu - Data & Knowledge Engineering, 2015 - Elsevier
In recent years, many organizations publish their data in non-aggregated format for research
purpose. However, publishing non-aggregated data raises serious concerns in data privacy …

Privacy for targeted advertising

A Mandal, J Mitchell, H Montgomery… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
In the past two decades, targeted online advertising has led to massive data collection,
aggregation, and exchange. This infrastructure raises significant privacy concerns. While …

Towards a systematic analysis of privacy definitions

BR Lin, D Kifer - Journal of Privacy and …, 2014 - journalprivacyconfidentiality.org
In statistical privacy, a privacy definition is regarded as a set of algorithms that are allowed to
process sensitive data. It is often helpful to consider the complementary view that privacy …

[HTML][HTML] The magazine archive includes every article published in Communications of the ACM for over the past 50 years.

A Machanavajjhala, D Kifer - Communications of the ACM, 2015 - cacm.acm.org
In 2006, AOL released a file containing search queries posed by many of its users. The user
names were replaced with random hashes, though the query text was not modified. It turns …

Tree Traversal to Achieve Generalization for Data De-identification

HJ CD, R Farshad - International Journal of Open Information …, 2018 - cyberleninka.ru
Every day data is published of different types and from various sources. Data de-
identification protects the privacy of most of this data before its publication. Over the recent …

[图书][B] A first principle approach toward data privacy and utility

BR Lin - 2014 - search.proquest.com
Individual data are collected by government and online service providers such as social
networks, search engines and shopping websites. The huge amount of data about users' …