咨询与建议

限定检索结果

文献类型

  • 118 篇 会议
  • 6 册 图书
  • 5 篇 期刊文献

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 105 篇 工学
    • 101 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 8 篇 信息与通信工程
    • 6 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 测绘科学与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 网络空间安全
  • 39 篇 理学
    • 31 篇 统计学(可授理学、...
    • 16 篇 数学
    • 2 篇 系统科学
    • 1 篇 物理学
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 4 篇 法学
    • 4 篇 社会学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 药学(可授医学、理...

主题

  • 20 篇 differential pri...
  • 18 篇 statistical disc...
  • 15 篇 privacy
  • 13 篇 data privacy
  • 13 篇 synthetic data
  • 11 篇 confidentiality
  • 6 篇 statistical disc...
  • 4 篇 data utility
  • 4 篇 cell suppression
  • 3 篇 clustering
  • 3 篇 tabular data
  • 3 篇 computers and so...
  • 3 篇 privacy-preservi...
  • 3 篇 statistics
  • 3 篇 microaggregation
  • 3 篇 database managem...
  • 3 篇 disclosure contr...
  • 3 篇 official statist...
  • 3 篇 controlled tabul...
  • 3 篇 additive noise

机构

  • 3 篇 natl ctr hlth st...
  • 3 篇 inst employment ...
  • 3 篇 penn state univ ...
  • 3 篇 umea univ dept c...
  • 2 篇 univ politecn ca...
  • 2 篇 ctr wiskunde & i...
  • 2 篇 urban inst washi...
  • 2 篇 csiro computat i...
  • 2 篇 georgia southern...
  • 2 篇 eurecom biot
  • 2 篇 univ rovira & vi...
  • 2 篇 stat netherlands...
  • 2 篇 off natl stat ti...
  • 2 篇 department of co...
  • 2 篇 univ politecn ca...
  • 2 篇 rovira i virgili...
  • 2 篇 rti int res tria...
  • 2 篇 univ lancaster l...
  • 2 篇 karlsruhe inst t...
  • 2 篇 internal revenue...

作者

  • 13 篇 domingo-ferrer j...
  • 6 篇 muralidhar krish...
  • 5 篇 oganian anna
  • 5 篇 josep domingo-fe...
  • 4 篇 castro jordi
  • 4 篇 sanchez david
  • 4 篇 vilhuber lars
  • 3 篇 slavkovic aleksa...
  • 3 篇 ruggles steven
  • 3 篇 drechsler joerg
  • 3 篇 ruiz nicolas
  • 3 篇 blanco-justicia ...
  • 3 篇 lesaja goran
  • 3 篇 torra vicenc
  • 3 篇 giessing sarah
  • 3 篇 iacob ionut
  • 2 篇 mccaa robert
  • 2 篇 onen melek
  • 2 篇 zari oualid
  • 2 篇 charest anne-sop...

语言

  • 128 篇 英文
  • 1 篇 中文
检索条件"任意字段=International Conference on Privacy in Statistical Databases, PSD 2022"
129 条 记 录,以下是31-40 订阅
排序:
Synthetic Individual Income Tax Data: Methodology, Utility, and privacy Implications
Synthetic Individual Income Tax Data: Methodology, Utility, ...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Bowen, Claire McKay Bryant, Victoria Burman, Leonard Czajka, John Khitatrakun, Surachai MacDonald, Graham McClelland, Robert Mucciolo, Livia Pickens, Madeline Ueyama, Kyle Williams, Aaron R. Wissoker, Doug Zwiefel, Noah Urban Inst Washington DC 20024 USA Internal Revenue Serv Washington DC 20002 USA Coiled New York NY 10018 USA UCL London England
The United States Internal Revenue Service Statistics of Income (SOI) Division possesses invaluable administrative tax data from individual income tax returns that could vastly expand our understanding of how tax poli... 详细信息
来源: 评论
Synthetic Decimal Numbers as a Flexible Tool for Suppression of Post-published Tabular Data
Synthetic Decimal Numbers as a Flexible Tool for Suppression...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Langsrud, Oyvind Bovelstad, Hege Marie Stat Norway POB 8131 Dept N-0033 Oslo Norway
Cell suppression is a widely used statistical disclosure control method for tabular data. Commonly, several linked tables are suppressed simultaneously. After publication, additional tables may be requested. In many c... 详细信息
来源: 评论
Asking the Proper Question: Adjusting Queries to statistical Procedures Under Differential privacy
Asking the Proper Question: Adjusting Queries to Statistical...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Shoham, Tomer Rinott, Yosef Hebrew Univ Jerusalem Dept Comp Sci Jerusalem Israel Hebrew Univ Jerusalem Federmann Ctr Study Rational Jerusalem Israel Hebrew Univ Jerusalem Dept Stat Jerusalem Israel
We consider a dataset S held by an agency, and a vector query of interest, f(S) is an element of R-k, to be posed by an analyst, which contains the information required for some planned statistical inference. The agen... 详细信息
来源: 评论
On Integrating the Number of Synthetic Data Sets m into the a priori Synthesis Approach
On Integrating the Number of Synthetic Data Sets m into the ...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Jackson, James Mitra, Robin Francis, Brian Dove, Iain Univ Lancaster Lancaster England Cardiff Univ Cardiff Wales Off Natl Stat Titchfield England
The synthesis mechanism given in [4] uses saturated models, along with overdispersed count distributions, to generate synthetic categorical data. The mechanism is controlled by tuning parameters, which can be tuned ac... 详细信息
来源: 评论
An Optimization-Based Decomposition Heuristic for the Microaggregation Problem
An Optimization-Based Decomposition Heuristic for the Microa...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Castro, Jordi Gentile, Claudio Spagnolo-Arrizabalaga, Enric Univ Politecn Cataluna Dept Stat & Operat Res Jordi Girona 1-3 Barcelona 08034 Spain CNR Ist Anal Sistemi Informat A Ruberti Rome Italy
Given a set of points, the microaggregation problem aims to find a clustering with a minimum sum of squared errors (SSE), where the cardinality of each cluster is greater than or equal to k. Points in the cluster are ... 详细信息
来源: 评论
Membership Inference Attack Against Principal Component Analysis
Membership Inference Attack Against Principal Component Anal...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Zari, Oualid Parra-Arnau, Javier Unsal, Ayse Strufe, Thorsten Onen, Melek EURECOM Biot France Karlsruhe Inst Technol Karlsruhe Germany Univ Politecn Cataluna Barcelona Spain
This paper studies the performance of membership inference attacks against principal component analysis (PCA). In this attack, we assume that the adversary has access to the principal components, and her main goal is ... 详细信息
来源: 评论
Tit-for-Tat Disclosure of a Binding Sequence of User Analyses in Safe Data Access Centers
Tit-for-Tat Disclosure of a Binding Sequence of User Analyse...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Domingo-Ferrer, Josep Univ Rovira & Virgili Dept Comp Engn & Math CYBERCAT Ctr Cybersecur Res Catalonia UNESCO Chair Data Privacy Av Paisos Catalans 26 Tarragona 43007 Spain
Safe access centers, a.k.a. trusted research environments, and digital marketplaces allow a user to submit her own statistical analyses on the data stored by controllers. As a responsible organization for the data, th... 详细信息
来源: 评论
Quality Assessment of the 2014 to 2019 National Survey on Drug Use and Health (NSDUH) Public Use Files
Quality Assessment of the 2014 to 2019 National Survey on Dr...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Sathe, Neeraja Yu, Feng Dai, Lanting Cribb, Devon Spagnola, Kathryn Saravia, Ana Cai, Rong Hoenig, Jennifer RTI Int Res Triangle Pk NC 27709 USA Subst Abuse & Mental Hlth Serv Adm 5600 Fishers Lane Rockville MD 20857 USA
National Survey on Drug Use and Health (NSDUH) public use files (PUFs) have been produced using a statistical disclosure control technique named MASSC, which stands for Micro Agglomeration, Substitution, Subsampling, ... 详细信息
来源: 评论
Automatic Evaluation of Disclosure Risks of Text Anonymization Methods
Automatic Evaluation of Disclosure Risks of Text Anonymizati...
收藏 引用
international conference on privacy in statistical databases (psd)
作者: Manzanares-Salor, Benet Sanchez, David Lison, Pierre Univ Rovira & Virgili Dept Comp Engn & Math UNESCO Chair Data Privacy CYBERCAT Tarragona Spain Norwegian Comp Ctr Oslo Norway
The standard approach to evaluate text anonymization methods consists of comparing their outcomes with the anonymization performed by human experts. The degree of privacy protection attained is then measured with the ... 详细信息
来源: 评论
Triggering Differential privacy to Counter Inference in statistical Database Security  2
Triggering Differential Privacy to Counter Inference in Stat...
收藏 引用
2nd international conference on Computing and Information Technology, ICCIT 2022
作者: Aljaedi, Amer College of Computing and Information Technology University of Tabuk Tabuk71491 Saudi Arabia
Inference attacks on statistical databases represent a complex issue in institutions and corporates since it is hard to detect and prevent, especially when it is committed by an internal adversary. The issue has been ... 详细信息
来源: 评论