IEEE Transactions on Knowledge and Data Engineering 21:7, 1073-1087.Synthesis Lectures on Information Security, Privacy, and Trust 4:1, 1-85.Concurrency and Computation: Practice and Experience 24:10, 1108-1122.
Privacy Enhancing Technologies: A Review - AboutMatthews, Ofer Harel. (2012) Assessing the privacy of randomized vector-valued queries to a database using the area under the receiver operating characteristic curve.
The Journal of China Universities of Posts and Telecommunications 21:2, 75-82.Valli Kumari, Ch. Sarojini. (2012) A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity.IEEE Transactions on Dependable and Secure Computing 11:1, 59-71.A release provides k-anonymity protection if the information for each person contained in the release cannot be distinguished from at least k-1 individuals whose information also appears in the release.Radaelli, V. K. Singh, A. S. Pentland. (2015) Unique in the shopping mall: On the reidentifiability of credit card metadata.
K K-Anonymity Privacy Threats in Location-Based Services Keyword Search Internet-Based Spatial Information.Journal of the American Medical Informatics Association 20:1, 109-116.Statistical Analysis and Data Mining: The ASA Data Science Journal 7:3, 175-193.International Journal of Information Management 36:6, 1184-1192.Health Services and Outcomes Research Methodology 10:1-2, 1-15.Churchill, I. Kohane. (2011) Strategies for maintaining patient privacy in i2b2.Garcia-Ulloa, Li Xiong, Vaidy Sunderam. (2016) Participant Privacy in Mobile Crowd Sensing Task Management.IEEE Transactions on Knowledge and Data Engineering 22:3, 392-403.
Kanhere, Matthias Hollick. (2011) A survey on privacy in mobile participatory sensing applications.IEEE Transactions on Information Forensics and Security 11:6, 1346-1361.
International Journal of Computational Models and Algorithms in Medicine 3:2, 63-75.Publishing data about individuals without revealing sensitive information about them is an important problem.Amelioration of Anonymity Modus Operandi for Privacy Preserving Data Publishing.Killourhy, Roy A. Maxion. (2007) Toward Realistic and Artifact-Free Insider-Threat Data.
Seidl, Piotr Jankowski, Ming-Hsiang Tsou. (2016) Privacy and spatial pattern preservation in masked GPS trajectory data.Ghenniwa, Abdulmutalib Wahaishi. (2015) Privacy in Internet of Things: A Model and Protection Framework.
International Journal of Geographical Information Science 30:4, 785-800.Bundesgesundheitsblatt - Gesundheitsforschung - Gesundheitsschutz 59:3, 385-389.IEEE Transactions on Knowledge and Data Engineering 22:1, 2-15.Riyazuddin, V. V. S. S. S. Balaram. 2017. Pattern Anonymization: Hybridizing Data Restructure with Feature Set Partitioning for Privacy Preserving in Supervised Learning.International Journal of Distributed Sensor Networks 9:11, 147839.Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4:4, 269-280.Journal of the American Medical Informatics Association 15:5, 569-574.Yu, De-Nian Yang, Ming-Syan Chen. (2014) Structural Diversity for Resisting Community Identification in Published Social Networks.
Dankar, Radja Badji. (2017) A risk-based framework for biomedical data sharing.IEEE Transactions on Parallel and Distributed Systems 20:12, 1764-1776.Proceedings of the National Academy of Sciences 105:46, 17608-17613.IEEE Transactions on Information Technology in Biomedicine 16:3, 413-423.
Vincent Poor. (2013) Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach.IEICE Transactions on Information and Systems E97.D:4, 876-883.Journal of Advanced Computational Intelligence and Intelligent Informatics 18:2, 239-245.Journal of the American Medical Informatics Association 22:5, 1029-1041.Engineering Applications of Artificial Intelligence 53, 1-18.Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 26:5, 820-829.El Emam, F. K. Dankar. (2008) Protecting Privacy Using k-Anonymity.
Srivastava. (2012) Balancing behavioral privacy and information utility in sensory data flows.
On the privacy offered by (k, δ) -anonymity, InformationInternational Journal of Information Security 13:6, 497-512.
International Journal of Distributed Sensor Networks 2013, 1-10.Chau, Thomas D.C. Little. (2013) Challenges in Retaining Privacy in Smart Spaces.The k-anonymity privacy requirement for publishing mi- crodata requires that each equivalence class (i.e., a set of records that are indistinguishable from each other.CLARKSON, FRED B. SCHNEIDER. (2015) Quantification of integrity.
Farine, Ariana Strandburg-Peshkin, Tanya Berger-Wolf, Brian Ziebart, Ivan Brugere, Jia Li, Margaret C. Crofoot. (2016) Both Nearest Neighbours and Long-term Affiliates Predict Individual Locations During Collective Movement in Wild Baboons.Jelin Taric, E. Poovammal. (2017) A Survey on Privacy Preserving Data Mining Techniques.