Differentially private data release for data mining

@inproceedings{Mohammed2011DifferentiallyPD,
  title={Differentially private data release for data mining},
  author={Noman Mohammed and Rui Chen and Benjamin C. M. Fung and Philip S. Yu},
  booktitle={KDD},
  year={2011}
}
Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among the existing privacy models, ∈-differential privacy provides one of the strongest privacy guarantees and has no assumptions about an adversary's background knowledge. Most of the existing solutions that ensure ∈-differential privacy are based on an interactive model, where the data miner is only allowed to pose aggregate queries to the database. In this paper, we… CONTINUE READING
Highly Influential
This paper has highly influenced 19 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 271 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 164 extracted citations

An improved differential privacy algorithm to protect re-identification of data

2017 IEEE Canada International Humanitarian Technology Conference (IHTC) • 2017
View 5 Excerpts
Highly Influenced

Differential Privacy in Telco Big Data Platform

PVLDB • 2015
View 14 Excerpts
Highly Influenced

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications • 2013
View 13 Excerpts
Highly Influenced

Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model

IEEE Transactions on Information Forensics and Security • 2016
View 7 Excerpts
Highly Influenced

Differential Privacy Based Access Control

OTM Conferences • 2016
View 7 Excerpts
Highly Influenced

271 Citations

0204060'12'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 271 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 29 references

Differential Privacy

Encyclopedia of Cryptography and Security • 2011
View 4 Excerpts
Highly Influenced

Mechanism Design via Differential Privacy

48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07) • 2007
View 6 Excerpts
Highly Influenced

Data mining with differential privacy

View 7 Excerpts
Highly Influenced

Differential Privacy via Wavelet Transforms

IEEE Transactions on Knowledge and Data Engineering • 2010
View 5 Excerpts
Highly Influenced

Interactive privacy via the median mechanism

View 5 Excerpts
Highly Influenced

Transparent anonymization: Thwarting adversaries who know the algorithm

ACM Trans. Database Syst. • 2010
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…