301
Voted
ICDE
17 years 3 days ago
2009 IEEE
Recent work has shown the importance of considering the adversary’s background knowledge when reasoning about privacy in data publishing. However, it is very difficult
for the d...
ICDE
15 years 7 months ago
2009 IEEE
— We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data is leaked and found in an un...
143
Voted
SIGMOD
15 years 7 months ago
2009 ACM
Mobile communication data analysis has been often used as a background application to motivate many data mining problems. However, very few data mining researchers have a chance t...
251
Voted
ICDE
17 years 4 days ago
2009 IEEE
Context is any information used to characterize the situation of an entity. Examples of contexts includetime, location, identity, and activity of a user. This paper proposes a gene...
239
Voted
ICDE
17 years 2 days ago
2009 IEEE
Existing approaches on privacy-preserving data publishing rely on the assumption that data can be divided into quasi-identifier attributes (QI) and sensitive attribute (SA). This ...
|