1 |
Bayardo, R. J. and Agrawal, R., "Data privacy through optimal k-anonymization," 21st International Conference on Data Engineering (ICDE'05), 2005.
|
2 |
El Emam, K., Dankar, F. K., Issa, R., and Jonker, E., "A Globally Optimal k-Anonymity Method for the De-Identification of Health Data," Journal of the American Medical Informatics Association, Vol. 16, No. 5, pp. 670-682, 2009.
DOI
|
3 |
Prasser, F. and Kohlmayer, F., "Putting Statistical Disclosure Control Into Practice: The ARX Data Anonymization Tool," Medical Data Privacy Handbook, Springer, November 2015.
|
4 |
Finkel, J., Grenager T., and Manning, C., "Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling," Proceedings of the 43nd Annual Meeting of the Association for Computational Linguistics, ACL, 2005.
|
5 |
Gobbel, G. T., Garvin, J., Reeves, R., Cronin, R. M., Heavirland, J., Williams, J., Weaver, A., Jayaramaraja, S., Giuse, D., Speroff, T., Brown, S. H., Xu, H., and Matheny, M. E., "Assisted annotation of medical free text using RapTAT," Journal of the American Medical Informatics Association, Vol. 21, No. 5, pp. 833-841, 2014.
DOI
|
6 |
Goldberger, A. L., Amaral, L. A. N., Glass, L., Hausdorff, J. M., Ivanov, P. C. H., Mark, R. G., Mietus, J. E., Moody, G. B., Peng, C. K., and Stanley, H. E., "PhysioBank, PhysioToolkit, and Physionet: Components of a New Research Resource for Complex Physiologic Signals, Circulation, Vol. 101, No. 23, pp. E215-20, 2000.
|
7 |
Information and Privacy Commissioner of Ontario, "De-identification Guidelines for Structured Data," Information and Privacy Commissioner of Ontario, 2016.
|
8 |
Iyengar, V. S., "Transforming data to satisfy privacy constraints," KDD '02 Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, 2002.
|
9 |
Lewis, David D, "Reuters-21578, Distribution 1.0," UCI Machine Learning Repository, https://archive.ics.uci.edu/ml/datasets/reuters-21578+text+categorization+collection.
|
10 |
Neamatullah, I., Douglass, M., Lehman, L. H., Reisner, A., Villarroel, M., Long, W. J., Szolovits, P., Moody, G. B., Mark, R. G., and Clifford, G. D., "Automated De-Identification of Free-Text Medical Records," BMC Medical Informatics and Decision Making, 2008.
DOI
|
11 |
Office for Civil Rights, "Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act(HIPAA) Privacy Rule," U.S. Department of Health & Human Services, 2015.
|
12 |
Garfinkel, S. L., "De-Identification of Personal Information," National Institute of Standards and Technology, 2015.
|
13 |
Sweeney, L., "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, Vol. 10, No. 5, pp. 557-570, 2002.
DOI
|
14 |
Park, C. W., Kim, J. W., and Kwon, H. J., "An Empirical Research on Information Privacy Risks and Policy Model in the Big data Era," The Journal of Society for e-Business Studies, Vol. 21, No. 1, pp. 131-145, 2016.
DOI
|
15 |
Ro, G. and Chun, J. H., "Classification and Performance Evaluation of Personal Identifiers and Quasi-identifiers for Implementing Medical Unstructured Text Deidentification System," KDBC, 2018.
|
16 |
Sweeney, L., "Achieving k-anonymity Privacy Protection Using Generalization and Suppression," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 10, No .5, pp. 571-588, 2002.
DOI
|