Anonymity Principles/Algorithms

  • Anonymizing Streaming Data for Privacy Protection, ICDE 2008 [link]
  • Injector: Mining Background Knowledge for Data Anonymization, ICDE 2008, [link]
  • k-Anonymization Revisited, ICDE 2008 [link]
  • Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, ICDE 2008 [link]
  • On Anti-Corruption Privacy Preserving Publication, ICDE 2008 [link]
  • On the Anonymization of Sparse High-Dimensional Data, ICDE 2008 [link]
  • On the Optimal Selection of k in the k-Anonymity Problem, ICDE 2008 [link]
  • Privacy Preserving Joins, ICDE 2008, [link]
  • Dynamic Anonymization: Accurate Statistical Analysis with Privacy Preservation, SIGMOD 2008 [link]
  • Privacy-MaxEnt Integrating Background Knowledge in Privacy Quantification, SIGMOD 2008 [link] [slides]
  • Private Queries in Location Based Services: Anonymizers are not Necessary, SIGMOD 2008 [link]
  • Preservation of Proximity Privacy in Publishing Numerical Sensitive Data, SIGMOD 2008 [link]
  • Towards Identity Anonymization on Graphs, SIGMOD 2008, [link]
  • The Cost of Privacy: Destruction of Data-Mining Utility in Anonymized Data Publishing, SIGKDD 2008 [link]
  • Privacy-preserving Anonymization of Set-valued Data, VLDB 2008 [link]
  • Privacy Preserving Serial Data Publishing By Role Composition, VLDB 2008 [link]
  • Resisting Structural Reidentification in Anonymized Social Networks, VLDB 2008 [link]
  • Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies, IEEE TKDE 2008 [link]
  • Ring Signature with Weak Linkability and Its Applications, IEEE TKDE 2008 [link]
  • Anonymity Preserving Pattern Discovery, VLDB Journal 2008 [link]
  • Providing k-Anonymity in Data Mining, VLDB Journal 2008 [link]
  • Aggregate Query Answering on Anonymized Tables, ICDE 2007 [link]
  • t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity, ICDE 2007 [link]
  • Worst-Case Background Knowledge, ICDE 2007 [link]
  • Hiding the Presence of Individuals from Shared Databases, SIGMOD 2007 [link] [slides]
  • m-Invariance: Towards Privacy Preserving Re-publication of Dynamic Datasets, SIGMOD 2007 [link] [slides]
  • Composition Attacks and Auxiliary Information in Data Privacy, SIGKDD 2007 [link]
  • Fast Data Anonymization with Low Information Loss, VLDB 2007 [link]
  • K-Anonymization as Spatial Indexing: Toward Scalable and Incremental Anonymization, VLDB 2007 [link]
  • Minimality Attack in Privacy Preserving Data Publishing, VLDB 2007 [link]
  • Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge, VLDB 2007 [link]
  • The Boundary Between Privacy and Utility in Data Publishing, VLDB 2007 [link]
  • Anonymizing Classification Data for Privacy Preservation, IEEE TKDE 2007 [link]
  • ℓ-Diversity: Privacy Beyond k-Anonymity, ICDE 2006 [link]
  • Mondrian Multidimensional k-Anonymity, ICDE 2006 [link]
  • Private Updates to Anonymous Databases, ICDE 2006 [link]
  • Injecting Utility into Anonymized Datasets, SIGMOD 2006 [link]
  • Personalized Privacy Preservation, SIGMOD 2006 [link] [slides]
  • Anonymizing Sequential Releases, SIGKDD 2006 [link] [slides]
  • Efficient Anonymity-Preserving Data Collection, SIGKDD 2006 [link]
  • Workload-Aware Anonymization, SIGKDD 2006 [link]
  • Anatomy: Simple and Effective Privacy Preservation, VLDB 2006 [link]
  • Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data, IEEE TKDE 2006 [link]
  • A Secure Distributed Framework for Achieving k-Anonymity, VLDB Journal 2006 [link]
  • Data Privacy Through Optimal k-Anonymization, ICDE 2005 [link]
  • Top-Down Specialization for Information and Privacy Preservation, ICDE 2005 [link]
  • Incognito: Efficient Full Domain K-Anonymity, SIGMOD 2005 [link]
  • To Do or Not To Do: The Dilemma of Disclosing Anonymized Data, SIGMOD 2005 [link] [slides]
  • Anonymity Preserving Data Collection, SIGKDD 2005 [link]
  • Checking for k-Anonymity Violation by Views, VLDB 2005 [link]
  • On k-Anonymity and the Curse of Dimensionality,VLDB05 [link]
  • k-Anonymity: A Model of Protecting Privacy, International Journal on Uncertainty,Fuzziness and Knowledge-based Systems, 2002 [link]


Distributed / Secure Multiparty Computation

  • Privacy-Preserving Cox Regression for Survival Analysis, SIGKDD 2008 [link]
  • Privacy Protection against Malicious Adversaries in Distributed Information Sharing Systems, IEEE TKDE 2008 [link]
  • Privacy Preserving Schema and Data Matching, SIGMOD 2007 [link]
  • Privacy-Preservation for Gradient Descent Methods, SIGKDD 2007 [link]
  • Privacy Preserving Query Processing using Third Parties, ICDE 2006 [link]
  • Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining, IEEE TKDE 2006 [link]
  • Distributed Privacy Preserving Information Sharing,VLDB 2005 [link]
  • PrivacyPreserving K-Means Clustering over VerticallyPartitioned Data, SIGKDD 2003 [link]
  • Tools for Privacy Preserving Distributed Data Mining, SIGKDD 2002 [link]


General Survey / Books

  • Privacy-Preserving Data Mining: Models and Algorithms, Springer, 2008 [SpringerLink]
  • Guest Editorial: Special Issue on Privacy Preserving Data Management, VLDB 2006 [link]
  • State-of-the-art in Privacy Preserving Data Mining, SIGMOD 2004 [link]


Heuristics / Miscellaneous

  • Butterfly: Protecting Output Privacy in Stream Mining, ICDE 2008 [link]
  • Detecting Privacy Leaks Using Corpus-based Association Rules, SIGKDD 2008 [link]
  • Privacy-preserving Naïve Bayes Classification, VLDB Journal 2008 [link]
  • Purpose Based Access Control for Privacy Protection in Relational Database Systems, VLDB Journal 2008 [link]
  • Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking, ICDE 2007 [link]
  • Preservation of Patterns and Input-Output Privacy, ICDE 2007 [link] [slides]
  • Threats to Privacy in the Forensic Analysis of Database Systems, SIGMOD 2007, [link]
  • Time Series Compressibility and Privacy, VLDB 2007 [link]
  • A Privacy-preserving Technique for Euclidean Distance-based Mining Algorithms Using Fourier-related Transforms,VLDB 2006 [link]
  • Privacy Leakage in Multi-relational Databases: a Semi-supervised Learning Perspective, VLDB Journal 2006, [link]
  • Succinct Representation of Flexible And Privacy-preserving Access Rights, VLDB Journal 2006, [link]
  • Privacy and Ownership Preserving of Outsourced Medical Data, ICDE 2005 [link]
  • Privacy-Preserving Top-k Queries, ICDE 2005 [link]
  • Privacy Preserving OLAP, SIGMOD 2005 [link] [slides]
  • A New Scheme on Privacy-Preserving Data Classification, SIGKDD 2005, [link]
  • Preserving Privacy by De-Identifying Face Images, IEEE TKDE 2005 [link]
  • Privacy Preserving Mining of Association Rules, SIGKDD 2002 [link]


Statistics / Distribution

  • On Unifying Privacy and Uncertain Data Models, ICDE 2008 [link]
  • Simulation-based Approaches for Privacy Preservation, VLDB 2008 [link]
  • On Randomization, Public Information and the Curse of Dimensionality, ICDE 2007 [link]
  • A Condensation Approach to Privacy Preserving Data Mining, EDBT 2004 [link]
  • On the Design and Quantification of Privacy Preserving, PODS 2001 [link] [slides]
  • Privacy-Preserving Data Mining, SIGMOD 2000 [link]