Affiliation:
1. RIKEN Center for Advanced Intelligence Project
2. JST PRESTO
3. National Institute of Information and Communications Technology (NICT)
4. Digital Garage, Inc.
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference35 articles.
1. [1] H. Arai, K. Emura, and T. Hayashi, “A framework of privacy preserving anomaly detection: Providing traceability without big brother,” Workshop on Privacy in the Electronic Society, pp.111-122, 2017. 10.1145/3139550.3139551
2. [2] D. Dua and C. Graff, “UCI machine learning repository,” 2019. http://archive.ics.uci.edu/ml
3. [3] Centers for Disease Control and Prevention and others, “Hipaa privacy rule and public health. guidance from CDC and the US department of health and human services,” MMWR: Morbidity and mortality weekly report, vol.52, no.1, pp.1-17, 2003.
4. [4] L. Sweeney, “Achieving k-anonymity privacy protection using generalization and suppression,” Int. J. Unc. Fuzz. Knowl. Based Syst., vol.10, no.5, pp.571-588, 2002. 10.1142/s021848850200165x
5. [5] K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, “Mondrian multidimensional k-anonymity,” Data Engineering, 2006. ICDE'06. Proc. 22nd International Conference on, pp.25-25, IEEE, 2006. 10.1109/icde.2006.101