Differentially Private k-Nearest Neighbor Missing Data Imputation | 0 | 0.34 | 2022 |
A Partitioned Recoding Scheme for Privacy Preserving Data Publishing. | 0 | 0.34 | 2020 |
When Is A Semi-Honest Secure Multiparty Computation Valuable? | 0 | 0.34 | 2019 |
Support vector classification with ℓ-diversity. | 0 | 0.34 | 2018 |
Differentially Private Feature Selection for Data Mining. | 0 | 0.34 | 2018 |
Statistical Learning Theory Approach for Data Classification with ℓ-diversity. | 0 | 0.34 | 2017 |
Towards a Framework for Developing Cyber Privacy Metrics: A Vision Paper | 0 | 0.34 | 2017 |
Instance-Based Learning With L-Diversity | 1 | 0.35 | 2017 |
Statistical Learning Theory Approach for Data Classification with l-diversity. | 1 | 0.35 | 2016 |
Differentially Private Significance Testing on Paired-Sample Data. | 0 | 0.34 | 2016 |
Decision Tree Classification on Outsourced Data. | 0 | 0.34 | 2016 |
K-Nearest Neighbor Classification Using Anatomized Data. | 0 | 0.34 | 2016 |
Laplace noise generation for two-party computational differential privacy | 1 | 0.36 | 2015 |
Privacy-Integrated Graph Clustering Through Differential Privacy. | 1 | 0.35 | 2015 |
Efficient Sanitization of Unsafe Data Correlations. | 0 | 0.34 | 2015 |
Anonymizing transactional datasets. | 3 | 0.44 | 2015 |
Combating discrimination using Bayesian networks | 9 | 0.55 | 2014 |
Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market. | 1 | 0.35 | 2014 |
Top-k frequent itemsets via differentially private fp-trees | 24 | 0.86 | 2014 |
Realizable Rational Multiparty Cryptographic Protocols | 1 | 0.34 | 2014 |
Privacy Beyond Confidentiality | 0 | 0.34 | 2014 |
Association Rule Mining On Fragmented Database | 0 | 0.34 | 2014 |
Updating outsourced anatomized private databases | 5 | 0.44 | 2013 |
On syntactic anonymity and differential privacy | 40 | 1.45 | 2013 |
Equilibrium Concepts for Rational Multiparty Computation | 2 | 0.35 | 2013 |
Privacy through Uncertainty in Location-Based Services | 6 | 0.41 | 2013 |
Challenges and Opportunities for Security with Differential Privacy. | 2 | 0.37 | 2013 |
Maintaining Database Anonymity in the Presence of Queries. | 0 | 0.34 | 2013 |
Using safety constraint for transactional dataset anonymization | 2 | 0.41 | 2013 |
Discriminatory Decision Policy Aware Classification | 3 | 0.41 | 2012 |
t-Plausibility: Generalizing Words to Desensitize Text | 11 | 0.62 | 2012 |
Special issue on the best papers of SDM'11 | 0 | 0.34 | 2012 |
Differential identifiability | 11 | 0.64 | 2012 |
Classifier evaluation and attribute selection against active adversaries | 23 | 1.24 | 2011 |
Query processing in private data outsourcing using anonymization | 9 | 0.59 | 2011 |
Anonymous Search Histories Featuring Personalized Advertisement-Balancing Privacy with Economic Interests | 3 | 0.40 | 2011 |
Efficient privacy-preserving similar document detection | 37 | 1.17 | 2010 |
Practical and Secure Integer Comparison and Interval Check | 10 | 0.54 | 2010 |
Privacy-Preserving Kth Element Score over Vertically Partitioned Data | 19 | 0.78 | 2009 |
Providing Privacy through Plausibly Deniable Search | 30 | 1.04 | 2009 |
Assured Information Sharing Life Cycle | 2 | 0.36 | 2009 |
t-Plausibility: Semantic Preserving Text Sanitization | 14 | 0.69 | 2009 |
Privacy-preserving decision trees over vertically partitioned data | 41 | 1.44 | 2008 |
Collaborative Search and User Privacy: How Can They Be Reconciled? | 2 | 0.45 | 2008 |
Opportunities for private and secure machine learning | 1 | 0.35 | 2008 |
Similar Document Detection with Limited Information Disclosure | 30 | 0.97 | 2008 |
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems | 8 | 0.70 | 2008 |
Privacy-preserving Naïve Bayes classification | 69 | 2.39 | 2008 |
Transforming semi-honest protocols to ensure accountability | 29 | 1.19 | 2008 |
Hiding the presence of individuals from shared databases | 95 | 3.41 | 2007 |