References
- Huang X, Liu J, Han Z, et al, "A new anonymity model for privacy-preserving data publishing," China Communications, vol. 11, no. 9, pp. 47-59, 2014. https://doi.org/10.1109/CC.2014.6969710
- Alvim M S, Andres M E, Chatzikokolakis K, et al, "Differential Privacy: on the trade-off between Utility and Information Leakage," in Proc. of International Conference on Formal Aspects of Security and Trust, vol. 7140, pp. 39-54, 2011.
- V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in Proc. of ACM SIGMOD International Conference on Management of Data, Indianapolis, Indiana, USA, pp. 735-746, 2010.
- Makhdoumi A, Fawaz N, "Privacy-utility tradeoff under statistical uncertainty," in Proc. of Allerton Conference on Communication, Control, and Computing, pp.1627-1634, 2013.
- Krause A, Horvitz E, "A utility-theoretic approach to privacy in online services," Journal of Artificial Intelligence Research, vol. 39, no. 1, pp. 633-662, 2010. https://doi.org/10.1613/jair.3089
- Xiong P, Zhu T, "An Anonymization Method Based on Tradeoff between Utility and Privacy for Data Publishing," in Proc. of International Conference on Management of E-Commerce and E-Government, pp.72-78, 2012.
- Loukides G, Shao J, "Data utility and privacy protection trade-off in k-anonymisation," in Proc. of International Workshop on Privacy and Anonymity in Information Society, Nantes, France, pp.36-45, March, 2008.
- Li T, Li N, "On the tradeoff between privacy and utility in data publishing," in Proc. of ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.517-526, 2009.
- Khokhar R H, Chen R, Fung B C M, et al, "Quantifying the costs and benefits of privacy-preserving health data publishing," Journal of Biomedical Informatics, vol. 50, no.8, pp. 107-121, 2014. https://doi.org/10.1016/j.jbi.2014.04.012
- Andreas Krause, Eric Horvitz, "A Utility-Theoretic Approach to Privacy and Personalization," in Proc. of Twenty-Third Conference on Artificial Intelligence, pp. 1181-1188, July 2008.
- Loukides G, Gkoulalas-Divanis A, Shao J, "On balancing disclosure risk and data utility in transaction data sharing using R-U confidentiality map," Joint UNECE/Eurostat work session on statistical data confidentiality, pp. 19, 2011.
- M. Terrovitis, N. Mamoulis, and P. Kalnis, "Privacy-preserving anonymization of set-valued data," PVLDB, vol. 1, no.1, pp. 115-125, 2008.
- G. Loukides, A. Gkoulalas-Divanis, and B. Malin, "COAT: Constraint-based anonymization of transactions," KAIS, vol. 28, no. 2, pp. 251-282, 2011.
- Gkoulalas-Divanis A, Loukides G, "PCTA: privacy-constrained clustering-based transaction data anonymization," in Proc. of International Workshop on Privacy and Anonymity in Information Society, pp.1-10, March, 2011.
- G. Loukides, A. Gkoulalas-Divanis, and J. Shao, "Assessing disclosure risk and data utility trade-off in transaction data anonymization," International Journal of Software and Information, vol. 6, no. 3, pp.399-417, 2012.
- Terrovitis M, Mamoulis N, Kalnis P, "Privacy-Preserving Anonymization Of Set-Valued Data," in Proc. of the Vldb Endowment, 115-125, 2008.
- G. Loukides, A. Gkoulalas-Divanis, and B. Malin, "COAT: COnstraint-based anonymization of transactions," Knowledge and Information Systems, vol. 28, no. 2, pp. 251-282, 2011. https://doi.org/10.1007/s10115-010-0354-4
- Salamatian S., Zhang A., du Pin Calmon F, et al, "Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy," IEEE Journal of Selected Topics in Signal Processing, vol. 9, no. 7, pp. 1240-1255, 2015. https://doi.org/10.1109/JSTSP.2015.2442227
- Ghosh A, Roughgarden T, Sundararajan M, "Universally Utility-Maximizing Privacy Mechanisms," Siam Journal on Computing, vol. 41, no. 6, pp. 351-360, 2009.
- Ali Makhdoumi, Nadia Fawaz, "Privacy-Utility Tradeoff under Statistical Uncertainty," in Proc. of Fifty-first Annual Allerton Conference, pp. 1627-1634, October 2-3, 2013.
- Chakraborty S, Charbiwala Z, Choi H, et al, "Balancing behavioral privacy and information utility in sensory data flows," Pervasive and Mobile Computing, vol. 8, no. 3, pp. 331-345, 2012. https://doi.org/10.1016/j.pmcj.2012.03.002
- Reza Shokri, "Privacy Games: Optimal Protection Mechanism Design for Bayesian and Differential Privacy," Submitted on 14 Feb 2014.
- Sankar L, Rajagopalan S R, Poor H V, "A theory of utility and privacy of data sources," in Proc. of 2010 IEEE International Symposium on Information Theory(ISIT), pp. 2642-2646, June 13-18, 2010.
- Y Oohama, "Gaussian multiterminal source coding," IEEE Transactions on Information Theory, vol. 43, no. 6, pp. 1912-1923, November, 1997. https://doi.org/10.1109/18.641555
- Wyner A D, "The rate-distortion function for source coding with side information at the decoder-II: General sources," Probability Theory & Related Fields, vol. 38, no. 1, pp. 60-80, 1978.
- Sheet D, Kaiwartya O, Abdullah A, et al. "Location Information Verification using Transferable Belief Model for Geographic Routing in VANETs," IET Intelligent Transport Systems, 2016.