Sciweavers

14 search results - page 3 / 3
» Injecting utility into anonymized datasets
Sort
View
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 5 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
EDBT
2008
ACM
146views Database» more  EDBT 2008»
14 years 5 months ago
Attribute selection in multivariate microaggregation
Microaggregation is one of the most employed microdata protection methods. The idea is to build clusters of at least k original records, and then replace them with the centroid of...
Javier Herranz, Jordi Nin, Vicenç Torra
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
14 years 6 months ago
Privacy-Preserving Data Mining through Knowledge Model Sharing
Privacy-preserving data mining (PPDM) is an important topic to both industry and academia. In general there are two approaches to tackling PPDM, one is statistics-based and the oth...
Patrick Sharkey, Hongwei Tian, Weining Zhang, Shou...
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
13 years 10 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu