Privacy-preserving data mining, ACM SIGMOD Record, vol.29, issue.2, pp.439-450, 2000. ,
DOI : 10.1145/335191.335438
Differentially private empirical risk minimization, The Journal of Machine Learning Research, vol.12, pp.1069-1109, 2011. ,
A near-optimal algorithm for differentially-private principal components, Journal of Machine Learning Res, vol.14, pp.2905-2943, 2013. ,
On syntactic anonymity and differential privacy, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp.161-183, 2013. ,
DOI : 10.1109/ICDEW.2013.6547433
Differential Privacy, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Boosting and Differential Privacy, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp.51-60, 2010. ,
DOI : 10.1109/FOCS.2010.12
Differential Privacy: A Survey of Results, Theory and Applications of Models of Computation, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Calibrating Noise to Sensitivity in Private Data Analysis, Proceedings of the 3rd Theory of Cryptography Conference, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
Data mining with differential privacy, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '10, pp.493-502, 2010. ,
DOI : 10.1145/1835804.1835868
Introduction to statistical pattern recognition, 1990. ,
A Practical Differentially Private Random Decision Tree Classifier, 2009 IEEE International Conference on Data Mining Workshops, pp.114-121, 2009. ,
DOI : 10.1109/ICDMW.2009.93
URL : http://www.cs.rutgers.edu/~rwright1/Publications/padm09a.pdf
When do data mining results violate privacy?, KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pp.599-604, 2004. ,
On differentially private low rank approximation, SODA '13: Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pp.1395-1414, 2013. ,
DOI : 10.1137/1.9781611973105.101
URL : http://www.mit.edu/~kapralov/papers/dp.pdf
On the privacy preserving properties of random data perturbation techniques, Third IEEE International Conference on Data Mining, p.99, 2003. ,
DOI : 10.1109/ICDM.2003.1250908
Private convex empirical risk minimization and high-dimensional regression, Journal of Machine Learning Research, vol.23, pp.1-41, 2012. ,
Differentially private M-estimators, Advances in Neural Information Processing Systems, pp.361-369, 2011. ,
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
-diversity, ICDE '06, 2006. ,
DOI : 10.1145/1217299.1217302
Large Margin Gaussian Mixture Models with Differential Privacy, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.4, pp.463-469, 2012. ,
DOI : 10.1109/TDSC.2012.27
Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.627-636, 2009. ,
DOI : 10.1145/1557019.1557090
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Privacy-preserving distributed clustering using generative models, Third IEEE International Conference on Data Mining, p.211, 2003. ,
DOI : 10.1109/ICDM.2003.1250922
URL : http://www.lans.ece.utexas.edu/~srujana/papers/icdm03.pdf
Generalizing data to provide anonymity when disclosing information (abstract), Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems , PODS '98, 1998. ,
DOI : 10.1145/275487.275508
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
URL : http://spdp.dti.unimi.it/papers/tkde_k-anonymity.pdf
Connecting privacy models: synergies between k-anonymity, t-closeness and differential privacy, Eurostat work session on statistical data confidentiality, 2013. ,
On the connection between t-closeness and differential privacy for data releases, IEEE International Conference on Security and Cryptography (SECRYPT), 2013. ,
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning, Journal of Privacy and Confidentiality, vol.4, issue.1, pp.65-100, 2012. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Differential Privacy for Clinical Trial Data: Preliminary Evaluations, 2009 IEEE International Conference on Data Mining Workshops, pp.138-143, 2009. ,
DOI : 10.1109/ICDMW.2009.52
Mixture of gaussian models and bayes error under differential privacy, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.179-190, 2011. ,
DOI : 10.1145/1943513.1943537
Anatomy: simple and effective privacy preservation, VLDB '06: Proceedings of the 32nd international conference on Very large data bases, pp.139-150, 2006. ,
Output perturbation with query relaxation, Proceedings of the VLDB Endowment, vol.1, issue.1, pp.857-869, 2008. ,
DOI : 10.14778/1453856.1453949
URL : http://www.vldb.org/pvldb/1/1453949.pdf