Hiding sequential and spatiotemporal patterns, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.12, pp.1709-1723, 2010. ,
Edit distance cannot be computed in strongly subquadratic time (unless SETH is false), 47th ACM Annual Symposium on Theory of Computing (STOC), pp.51-58, 2015. ,
String sanitization: A combinatorial approach, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), vol.7, p.14, 2019. ,
, String Sanitization Under Edit Distance
, Combinatorial algorithms for string sanitization. arXiv, 2019.
Reverse-safe data structures for text indexing, Symposium on Algorithm Engineering and Experiments (ALENEX), pp.199-213, 2020. ,
An information-theoretic approach to individual sequential data sanitization, 9th ACM International Conference on Web Search and Data Mining (WSDM), pp.337-346, 2016. ,
Quadratic conditional lower bounds for string problems and dynamic time warping, 56th IEEE Annual Symposium on Foundations of Computer Science (FOCS), pp.79-97, 2015. ,
Department of Health & Human Services, Health Insurance Portablility and Accountability Act, 1996. ,
Permutation-based sequential pattern hiding, 13th IEEE International Conference on Data Mining (ICDM), pp.241-250, 2013. ,
On the complexity of k-SAT, Journal of Computer and Systems Sciences, vol.62, issue.2, pp.367-375, 2001. ,
Which problems have strongly exponential complexity?, Journal of Computer and Systems Sciences, vol.63, issue.4, pp.512-530, 2001. ,
SEPIA: estimating selectivities of approximate string predicates in large databases, The VLDB Journal, vol.17, issue.5, pp.1213-1229, 2008. ,
Binary codes capable of correcting deletions, insertions and reversals, Soviet Physics Doklady, vol.10, p.707, 1966. ,
Efficient secure similarity computation on encrypted trajectory data, 31st IEEE International Conference on Data Engineering (ICDE), pp.66-77, 2015. ,
Optimal event sequence sanitization, SIAM International Conference on Data Mining (SDM), pp.775-783, 2015. ,
Efficiently supporting edit distance based string similarity search using B + -trees, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.12, pp.2983-2996, 2014. ,
Determining the identifiability of DNA database entries, American Medical Informatics Association Annual Symposium (AMIA), pp.537-541, 2000. ,
Approximate matching of regular expressions, Bulletin of Mathematical Biology, vol.51, issue.1, pp.5-37, 1989. ,
General Data Protection Regulation ,
Apriori-based algorithms for km-anonymizing trajectory data, Transactions on Data Privacy, vol.7, pp.165-194, 2014. ,
MACFP: Maximal Approximate Consecutive Frequent Pattern Mining under edit distance, SIAM International Conference on Data Mining (SDM), pp.558-566, 2016. ,
Information privacy research: An interdisciplinary review, MIS Quarterly, vol.35, issue.4, pp.989-1015, 2011. ,
Local suppression and splitting techniques for privacy preserving publication of trajectories, IEEE Transactions on Knowledge and Data Engineering, vol.29, issue.7, pp.1466-1479, 2017. ,
2ED: An Efficient Entity Extraction Algorithm using two-level Edit-Distance, 35th IEEE International Conference on Data Engineering (ICDE), pp.998-1009, 2019. ,