default search action
Search dblp for Publications
export results for "stream:journals/jpc:"
@article{DBLP:journals/jpc/BenedettoT23, author = {Gary Benedetto and Evan Totty}, title = {Synthesizing Familial Linkages for Privacy in Microdata}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.767}, doi = {10.29012/JPC.767}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BenedettoT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CummingsKR23, author = {Rachel Cummings and Gabriel Kaptchuk and Elissa M. Redmiles}, title = {"I need a better description": An Investigation Into User Expectations For Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.813}, doi = {10.29012/JPC.813}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/CummingsKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/EtzKP23, author = {Kathy Etz and Heather Kimmel and Amy Pienta}, title = {National Addiction and {HIV} Data Archive Program: Developing an Approach for Reuse of Sensitive and Confidential Data}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.853}, doi = {10.29012/JPC.853}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/EtzKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GreenR23, author = {Elizabeth Green and Felix Ritchie}, title = {The present and future of the Five Safes framework}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.831}, doi = {10.29012/JPC.831}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/GreenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GreenR23a, author = {Elizabeth Green and Felix Ritchie}, title = {Using pedagogical and psychological insights to train analysts using confidential data}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.842}, doi = {10.29012/JPC.842}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/GreenR23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/JahanaraACRS23, author = {MohammadMahdi Jahanara and Vahid R. Asadi and Marco Carmosino and Akbar Rafiey and Bahar Salamatian}, title = {Private Boosted Decision Trees via Smooth Re-Weighting}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.808}, doi = {10.29012/JPC.808}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/JahanaraACRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/JangPLS23, author = {Joy Bohyun Jang and Amy M. Pienta and Margaret Levenstein and Joe Saul}, title = {Restricted data management: the current practice and the future}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.844}, doi = {10.29012/JPC.844}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/JangPLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KarcherSW23, author = {Sebastian Karcher and Sefa Secen and Nicholas Weber}, title = {Protecting Sensitive Data Early in the Research Data Lifecycle}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.846}, doi = {10.29012/JPC.846}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KarcherSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/MarcotteRO23, author = {John E. Marcotte and Sarah Rush and Kelly Ogden{-}Schuette}, title = {Tiered Access to Research Data for Secondary Analysis}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.825}, doi = {10.29012/JPC.825}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/MarcotteRO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/McKennaMHM23, author = {Ryan McKenna and Gerome Miklau and Michael Hay and Ashwin Machanavajjhala}, title = {Optimizing Error of High-Dimensional Statistical Queries Under Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.791}, doi = {10.29012/JPC.791}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/McKennaMHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/PientaJL23, author = {Amy M. Pienta and Joy Jang and Margaret Levenstein}, title = {Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.845}, doi = {10.29012/JPC.845}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/PientaJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BudiuTGWZ22, author = {Mihai Budiu and Pratiksha Thaker and Parikshit Gopalan and Udi Wieder and Matei Zaharia}, title = {Overlook: Differentially Private Exploratory Visualization for Big Data}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {1}, year = {2022}, url = {https://doi.org/10.29012/jpc.779}, doi = {10.29012/JPC.779}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BudiuTGWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CanonneKS22, author = {Cl{\'{e}}ment L. Canonne and Gautam Kamath and Thomas Steinke}, title = {Discrete Gaussian for Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {1}, year = {2022}, url = {https://doi.org/10.29012/jpc.784}, doi = {10.29012/JPC.784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/CanonneKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Gong22, author = {Ruobin Gong}, title = {Exact Inference with Approximate Computation for Differentially Private Data via Perturbations}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {2}, year = {2022}, url = {https://doi.org/10.29012/jpc.797}, doi = {10.29012/JPC.797}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Gong22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/HehirSN22, author = {Jonathan Hehir and Aleksandra B. Slavkovic and Xiaoyue Niu}, title = {Consistent Spectral Clustering of Network Block Models under Local Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {2}, year = {2022}, url = {https://doi.org/10.29012/jpc.811}, doi = {10.29012/JPC.811}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/HehirSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KaissisKJZUR22, author = {Georgios Kaissis and Moritz Knolle and Friederike Jungmann and Alexander Ziller and Dmitrii Usynin and Daniel Rueckert}, title = {Unified Interpretation of the Gaussian Mechanism for Differential Privacy Through the Sensitivity Index}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {1}, year = {2022}, url = {https://doi.org/10.29012/jpc.807}, doi = {10.29012/JPC.807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/KaissisKJZUR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LebedaAP22, author = {Christian Janos Lebeda and Martin Aum{\"{u}}ller and Rasmus Pagh}, title = {Representing Sparse Vectors with Differential Privacy, Low Error, Optimal Space, and Fast Access}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {2}, year = {2022}, url = {https://doi.org/10.29012/jpc.809}, doi = {10.29012/JPC.809}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LebedaAP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NissimY22, author = {Kobbi Nissim and Chao Yan}, title = {The Sample Complexity of Distribution-Free Parity Learning in the Robust Shuffle Model}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {2}, year = {2022}, url = {https://doi.org/10.29012/jpc.805}, doi = {10.29012/JPC.805}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/NissimY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NixonBRS22, author = {Michelle Nixon and Andr{\'{e}}s F. Barrientos and Jerome P. Reiter and Aleksandra B. Slavkovic}, title = {A Latent Class Modeling Approach for Differentially Private Synthetic Data for Contingency Tables}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {1}, year = {2022}, url = {https://doi.org/10.29012/jpc.768}, doi = {10.29012/JPC.768}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/NixonBRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/VidanageRCS22, author = {Anushka Vidanage and Thilina Ranbaduge and Peter Christen and Rainer Schnell}, title = {Taxonomy of Attacks on Privacy-Preserving Record Linkage}, journal = {J. Priv. Confidentiality}, volume = {12}, number = {1}, year = {2022}, url = {https://doi.org/10.29012/jpc.764}, doi = {10.29012/JPC.764}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/VidanageRCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BaoXZZD21, author = {Ergute Bao and Xiaokui Xiao and Jun Zhao and Dongping Zhang and Bolin Ding}, title = {Synthetic Data Generation with Differential Privacy via Bayesian Networks}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {3}, year = {2021}, url = {https://doi.org/10.29012/jpc.776}, doi = {10.29012/JPC.776}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BaoXZZD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BowenS21, author = {Claire McKay Bowen and Joshua Snoke}, title = {Comparative Study of Differentially Private Synthetic Data Algorithms from the {NIST} {PSCR} Differential Privacy Synthetic Data Challenge}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.748}, doi = {10.29012/JPC.748}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BowenS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CheuSU21, author = {Albert Cheu and Adam D. Smith and Jonathan R. Ullman}, title = {Manipulation Attacks in Local Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.754}, doi = {10.29012/JPC.754}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/CheuSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DaganF21, author = {Yuval Dagan and Vitaly Feldman}, title = {Interaction is Necessary for Distributed Learning with Privacy or Communication Constraints}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.781}, doi = {10.29012/JPC.781}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/DaganF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkSZ21, author = {Cynthia Dwork and Weijie J. Su and Li Zhang}, title = {Differentially private false discovery rate control}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.755}, doi = {10.29012/JPC.755}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GopiGKSSY21, author = {Sivakanth Gopi and Pankaj Gulhane and Janardhan Kulkarni and Judy Hanwen Shen and Milad Shokouhi and Sergey Yekhanin}, title = {Differentially Private Set Union}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {3}, year = {2021}, url = {https://doi.org/10.29012/jpc.780}, doi = {10.29012/JPC.780}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/GopiGKSSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Harvey21, author = {Michael Harvey}, title = {Research Data Centres - a Regulator's Perspective}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.769}, doi = {10.29012/JPC.769}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Harvey21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Jarmin21, author = {Ron S. Jarmin}, title = {Reflections on the Successes and Challenges of Research Data Centers in Canada and the {U.S}}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.765}, doi = {10.29012/JPC.765}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Jarmin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/McKennaMS21, author = {Ryan McKenna and Gerome Miklau and Daniel Sheldon}, title = {Winning the {NIST} Contest: {A} scalable and general approach to differentially private synthetic data}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {3}, year = {2021}, url = {https://doi.org/10.29012/jpc.778}, doi = {10.29012/JPC.778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/McKennaMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Ritchie21, author = {Felix Ritchie}, title = {Microdata access and privacy: What have we learned over twenty years?}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.766}, doi = {10.29012/JPC.766}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Ritchie21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/RogersSPDLKSA21, author = {Ryan Rogers and Subbu Subramaniam and Sean Peng and David Durfee and Seunghyun Lee and Santosh Kumar Kancha and Shraddha Sahay and Parvez Ahammad}, title = {LinkedIn's Audience Engagements {API:} {A} Privacy Preserving Data Analytics System at Scale}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {3}, year = {2021}, url = {https://doi.org/10.29012/jpc.782}, doi = {10.29012/JPC.782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/RogersSPDLKSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SealfonU21, author = {Adam Sealfon and Jonathan R. Ullman}, title = {Efficiently Estimating Erdos-Renyi Graphs with Node Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.745}, doi = {10.29012/JPC.745}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/SealfonU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Silberman21, author = {Roxane Silberman}, title = {Developing access to confidential data in France: results and new challenges}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.788}, doi = {10.29012/JPC.788}, timestamp = {Fri, 13 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Silberman21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Vilhuber21, author = {Lars Vilhuber}, title = {Expansion, perspectives, and challenges}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {1}, year = {2021}, url = {https://doi.org/10.29012/jpc.777}, doi = {10.29012/JPC.777}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Vilhuber21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Vilhuber21a, author = {Lars Vilhuber}, title = {Editorial: Articles, perspectives, and {TPDP}}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.801}, doi = {10.29012/JPC.801}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Vilhuber21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WangLZ21, author = {Tianhao Wang and Ninghui Li and Zhikun Zhang}, title = {DPSyn: Experiences in the {NIST} Differential Privacy Data Synthesis Challenges}, journal = {J. Priv. Confidentiality}, volume = {11}, number = {2}, year = {2021}, url = {https://doi.org/10.29012/jpc.775}, doi = {10.29012/JPC.775}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WangLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AcharyaKSZ20, author = {Jayadev Acharya and Gautam Kamath and Ziteng Sun and Huanyu Zhang}, title = {{INSPECTRE:} Privately Estimating the Unseen}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.724}, doi = {10.29012/JPC.724}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AcharyaKSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AsgharDRMK20, author = {Hassan Jameel Asghar and Ming Ding and Thierry Rakotoarivelo and Sirine Mrabet and Dali Kaafar}, title = {Differentially Private Release of Datasets using Gaussian Copula}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.686}, doi = {10.29012/JPC.686}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AsgharDRMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AwanS20, author = {Jordan Awan and Aleksandra B. Slavkovic}, title = {Differentially Private Inference for Binomial Data}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.725}, doi = {10.29012/JPC.725}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AwanS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BalleBG20, author = {Borja Balle and Gilles Barthe and Marco Gaboardi}, title = {Privacy Profiles and Amplification by Subsampling}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.726}, doi = {10.29012/JPC.726}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BalleBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BittnerBGRSW20, author = {Daniel M. Bittner and Alejandro E. Brito and Mohsen Ghassemi and Shantanu Rane and Anand D. Sarwate and Rebecca N. Wright}, title = {Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.720}, doi = {10.29012/JPC.720}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BittnerBGRSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ChienWM20, author = {Chien{-}Hung Chien and Alan H. Welsh and John D. Moore}, title = {Synthetic Business Microdata - an Australian example}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.733}, doi = {10.29012/JPC.733}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/ChienWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CohenN20, author = {Aloni Cohen and Kobbi Nissim}, title = {Linear Program Reconstruction in Practice}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.711}, doi = {10.29012/JPC.711}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/CohenN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DingMW20, author = {Aidong Adam Ding and Guanhong Miao and Samuel Shangwu Wu}, title = {On the Privacy and Utility Properties of Triple Matrix-Masking}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.674}, doi = {10.29012/JPC.674}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DingMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkKNV20, author = {Cynthia Dwork and Alan F. Karr and Kobbi Nissim and Lars Vilhuber}, title = {On Privacy in the Age of {COVID-19}}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.749}, doi = {10.29012/JPC.749}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/DworkKNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/HolohanABA20, author = {Naoise Holohan and Spiros Antonatos and Stefano Braghin and P{\'{o}}l Mac Aonghusa}, title = {The Bounded Laplace Mechanism in Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.715}, doi = {10.29012/JPC.715}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/HolohanABA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/JosephRUW20, author = {Matthew Joseph and Aaron Roth and Jonathan R. Ullman and Bo Waggoner}, title = {Local Differential Privacy for Evolving Data}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.718}, doi = {10.29012/JPC.718}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/JosephRUW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NikolovV20, author = {Aleksandar Nikolov and Lars Vilhuber}, title = {Editorial for Special Issue on the Theory and Practice of Differential Privacy 2018}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.736}, doi = {10.29012/JPC.736}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/NikolovV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NikolovV20a, author = {Aleksandar Nikolov and Lars Vilhuber}, title = {Program for {TPDP} 2018}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {1}, year = {2020}, url = {https://doi.org/10.29012/jpc.697}, doi = {10.29012/JPC.697}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/NikolovV20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WangBK20, author = {Yu{-}Xiang Wang and Borja Balle and Shiva Prasad Kasiviswanathan}, title = {Subsampled R{\'{e}}nyi Differential Privacy and Analytical Moments Accountant}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.723}, doi = {10.29012/JPC.723}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WangBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AventKZHL19, author = {Brendan Avent and Aleksandra Korolova and David Zeber and Torgeir Hovden and Benjamin Livshits}, title = {{BLENDER:} Enabling Local Search with a Hybrid Differential Privacy Model}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.680}, doi = {10.29012/JPC.680}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AventKZHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BalcerV19, author = {Victor Balcer and Salil P. Vadhan}, title = {Differential Privacy on Finite Computers}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.679}, doi = {10.29012/JPC.679}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BalcerV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BartheDGHRS19, author = {Gilles Barthe and Christos Dimitrakakis and Marco Gaboardi and Andreas Haeberlen and Aaron Roth and Aleksandra B. Slavkovic}, title = {Program for {TPDP} 2016}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.699}, doi = {10.29012/JPC.699}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BartheDGHRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BunSU19, author = {Mark Bun and Thomas Steinke and Jonathan R. Ullman}, title = {Make Up Your Mind: The Price of Online Queries in Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.655}, doi = {10.29012/JPC.655}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BunSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ChettyF19, author = {Raj Chetty and John N Friedman}, title = {A Practical Method to Reduce Privacy Loss When Disclosing Statistics Based on Small Samples}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.716}, doi = {10.29012/JPC.716}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/ChettyF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkKM19, author = {Cynthia Dwork and Nitin Kohli and Deirdre K. Mulligan}, title = {Differential Privacy in Practice: Expose your Epsilons!}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.689}, doi = {10.29012/JPC.689}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/FooteMM19, author = {Andrew David Foote and Ashwin Machanavajjhala and Kevin McKinney}, title = {Releasing Earnings Distributions using Differential Privacy - Disclosure Avoidance System For Post-Secondary Employment Outcomes {(PSEO)}}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.722}, doi = {10.29012/JPC.722}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/FooteMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Gaboardi19, author = {Marco Gaboardi}, title = {Special Issue on the Theory and Practice of Differential Privacy 2016}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.717}, doi = {10.29012/JPC.717}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Gaboardi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Sheffet19, author = {Or Sheffet}, title = {Differentially Private Ordinary Least Squares}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.654}, doi = {10.29012/JPC.654}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Sheffet19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/StemmerN19, author = {Uri Stemmer and Kobbi Nissim}, title = {Concentration Bounds for High Sensitivity Functions Through Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.658}, doi = {10.29012/JPC.658}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/StemmerN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/UllmanV19, author = {Jonathan R. Ullman and Lars Vilhuber}, title = {Editorial for Volume 9 Issue 2}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.731}, doi = {10.29012/JPC.731}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/UllmanV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/UllmanV19a, author = {Jonathan R. Ullman and Lars Vilhuber}, title = {Program for {TPDP} 2017}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.698}, doi = {10.29012/JPC.698}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/UllmanV19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Wang19, author = {Yu{-}Xiang Wang}, title = {Per-instance Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.662}, doi = {10.29012/JPC.662}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Wang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WangKL19, author = {Yue Wang and Daniel Kifer and Jaewoo Lee}, title = {Differentially Private Confidence Intervals for Empirical Risk Minimization}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {1}, year = {2019}, url = {https://doi.org/10.29012/jpc.660}, doi = {10.29012/JPC.660}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WangKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WuRLWN19, author = {Zhiwei Steven Wu and Aaron Roth and Katrina Ligett and Bo Waggoner and Seth Neel}, title = {Accuracy First: Selecting a Differential Privacy Level for Accuracy-Constrained {ERM}}, journal = {J. Priv. Confidentiality}, volume = {9}, number = {2}, year = {2019}, url = {https://doi.org/10.29012/jpc.682}, doi = {10.29012/JPC.682}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WuRLWN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Abowd18, author = {John M. Abowd}, title = {Tribute to Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.707}, doi = {10.29012/JPC.707}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Abowd18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AmitaiR18, author = {Gilad Amitai and Jerome P. Reiter}, title = {Differentially private posterior summaries for linear regression coefficients}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.683}, doi = {10.29012/JPC.683}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AmitaiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Dwork18, author = {Cynthia Dwork}, title = {The Future of the Journal of Privacy and Confidentiality}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.708}, doi = {10.29012/JPC.708}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Dwork18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Dwork18a, author = {Cynthia Dwork}, title = {Reminiscences}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.702}, doi = {10.29012/JPC.702}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Dwork18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkU18, author = {Cynthia Dwork and Jonathan R. Ullman}, title = {The Fienberg Problem: How to Allow Human Interactive Data Analysis in the Age of Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.687}, doi = {10.29012/JPC.687}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/DworkU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Karr18, author = {Alan F. Karr}, title = {Reminiscences of Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.691}, doi = {10.29012/JPC.691}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Karr18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Karwa18, author = {Vishesh Karwa}, title = {Steve's influence on my work}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.704}, doi = {10.29012/JPC.704}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Karwa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kifer18, author = {Dan Kifer}, title = {Reminiscenses of Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.705}, doi = {10.29012/JPC.705}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Kifer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KinneyK18, author = {Saki Kinney and Alan F. Karr}, title = {Public-Use vs. Restricted-Use: An Analysis Using the American Community Survey}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.661}, doi = {10.29012/JPC.661}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/KinneyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LiKSS18, author = {Bai Li and Vishesh Karwa and Aleksandra B. Slavkovic and Rebecca Carter Steorts}, title = {A Privacy Preserving Algorithm to Release Sparse High-dimensional Histograms}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.657}, doi = {10.29012/JPC.657}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/LiKSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Reiter18, author = {Jerome P. Reiter}, title = {Reminiscences of Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.692}, doi = {10.29012/JPC.692}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Reiter18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Shlomo18, author = {Natalie Shlomo}, title = {Statistical Disclosure Limitation: New Directions and Challenges}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.684}, doi = {10.29012/JPC.684}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Shlomo18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Shlomo18a, author = {Natalie Shlomo}, title = {In Honour of Steve and Joyce Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.695}, doi = {10.29012/JPC.695}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Shlomo18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SlavkovicV18, author = {Aleksandra B. Slavkovic and Lars Vilhuber}, title = {Remembering Stephen Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.685}, doi = {10.29012/JPC.685}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/SlavkovicV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Smith18, author = {Adam Smith}, title = {Reminiscences about Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.696}, doi = {10.29012/JPC.696}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Smith18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Steorts18, author = {Rebecca Carter Steorts}, title = {Memories of Steve Fienberg}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.709}, doi = {10.29012/JPC.709}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Steorts18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Ventura18, author = {Samuel L. Ventura}, title = {Steve Fienberg and Student Research}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.693}, doi = {10.29012/JPC.693}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Ventura18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Vilhuber18, author = {Lars Vilhuber}, title = {Relaunching the Journal of Privacy and Confidentiality}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.706}, doi = {10.29012/JPC.706}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Vilhuber18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WangKLK18, author = {Yue Wang and Daniel Kifer and Jaewoo Lee and Vishesh Karwa}, title = {Statistical Approximating Distributions Under Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {8}, number = {1}, year = {2018}, url = {https://doi.org/10.29012/jpc.666}, doi = {10.29012/JPC.666}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WangKLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Abowd16, author = {John M. Abowd}, title = {How Will Statistical Agencies Operate When All Data Are Private?}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.404}, doi = {10.29012/JPC.V7I3.404}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Abowd16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AlagganGK16, author = {Mohammad Alaggan and S{\'{e}}bastien Gambs and Anne{-}Marie Kermarrec}, title = {Heterogeneous Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.652}, doi = {10.29012/JPC.V7I2.652}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/AlagganGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BackesKMMM16, author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi}, title = {AnoA: {A} Framework for Analyzing Anonymous Communication Protocols}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.651}, doi = {10.29012/JPC.V7I2.651}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BackesKMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CharestH16, author = {Anne{-}Sophie Charest and Yiwei Hou}, title = {On the Meaning and Limits of Empirical Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, pages = {53--66}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.406}, doi = {10.29012/JPC.V7I3.406}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/CharestH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkMNS16, author = {Cynthia Dwork and Frank McSherry and Kobbi Nissim and Adam D. Smith}, title = {Calibrating Noise to Sensitivity in Private Data Analysis}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, pages = {17--51}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.405}, doi = {10.29012/JPC.V7I3.405}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkMNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/EbadiS16, author = {Hamid Ebadi and David Sands}, title = {Featherweight {PINQ}}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.653}, doi = {10.29012/JPC.V7I2.653}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/EbadiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GaboardiAHRW16, author = {Marco Gaboardi and Emilio Jes{\'{u}}s Gallego Arias and Justin Hsu and Aaron Roth and Zhiwei Steven Wu}, title = {Dual Query: Practical Private Query Release for High Dimensional Data}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.650}, doi = {10.29012/JPC.V7I2.650}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/GaboardiAHRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GaboardiS16, author = {Marco Gaboardi and Chris J. Skinner}, title = {Special Issue on the Theory and Practice of Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.647}, doi = {10.29012/JPC.V7I2.647}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/GaboardiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KoufogiannisHP16, author = {Fragkiskos Koufogiannis and Shuo Han and George J. Pappas}, title = {Gradual Release of Sensitive Data under Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.649}, doi = {10.29012/JPC.V7I2.649}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KoufogiannisHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/RaabND16, author = {Gillian M. Raab and Beata Nowok and Chris Dibben}, title = {Practical Data Synthesis for Large Samples}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, pages = {67--97}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.407}, doi = {10.29012/JPC.V7I3.407}, timestamp = {Mon, 19 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/RaabND16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SteinkeU16, author = {Thomas Steinke and Jonathan R. Ullman}, title = {Between Pure and Approximate Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {2}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i2.648}, doi = {10.29012/JPC.V7I2.648}, timestamp = {Sun, 14 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/SteinkeU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WuCBZ16, author = {Samuel S. Wu and Shigang Chen and Deborah L Burr and Long Zhang}, title = {A New Data Collection Technique for Preserving Privacy}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {3}, pages = {99--129}, year = {2016}, url = {https://doi.org/10.29012/jpc.v7i3.408}, doi = {10.29012/JPC.V7I3.408}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WuCBZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg15, author = {Stephen E. Fienberg}, title = {In This Issue}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {1}, year = {2015}, url = {https://doi.org/10.29012/jpc.v7i1.642}, doi = {10.29012/JPC.V7I1.642}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/HuangSS15, author = {Chong Huang and Lalitha Sankar and Anand D. Sarwate}, title = {Designing Incentive Schemes for Privacy-Sensitive Users}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {1}, year = {2015}, url = {https://doi.org/10.29012/jpc.v7i1.646}, doi = {10.29012/JPC.V7I1.646}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/HuangSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kim15, author = {Nicolas Kim}, title = {The Effect of Data Swapping on Analyses of American Community Survey Data}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {1}, year = {2015}, url = {https://doi.org/10.29012/jpc.v7i1.644}, doi = {10.29012/JPC.V7I1.644}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KleinS15, author = {Martin Klein and Bimal Sinha}, title = {Likelihood Based Finite Sample Inference for Singly Imputed Synthetic Data Under the Multivariate Normal and Multiple Linear Regression Models}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {1}, year = {2015}, url = {https://doi.org/10.29012/jpc.v7i1.645}, doi = {10.29012/JPC.V7I1.645}, timestamp = {Thu, 10 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/KleinS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Murray15, author = {Jared S. Murray}, title = {Probabilistic Record Linkage and Deduplication after Indexing, Blocking, and Filtering}, journal = {J. Priv. Confidentiality}, volume = {7}, number = {1}, year = {2015}, url = {https://doi.org/10.29012/jpc.v7i1.643}, doi = {10.29012/JPC.V7I1.643}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Murray15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AcquistiGS14, author = {Alessandro Acquisti and Ralph Gross and Fred Stutzman}, title = {Face Recognition and Privacy in the Age of Augmented Reality}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i2.638}, doi = {10.29012/JPC.V6I2.638}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AcquistiGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CrimiE14, author = {Nicole Crimi and William F. Eddy}, title = {Top-Coding and Public Use Microdata Samples from the {U.S.} Census Bureau}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i2.639}, doi = {10.29012/JPC.V6I2.639}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/CrimiE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kasiviswanathan14, author = {Shiva Prasad Kasiviswanathan and Adam D. Smith}, title = {On the 'Semantics' of Differential Privacy: {A} Bayesian Formulation}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {1}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i1.634}, doi = {10.29012/JPC.V6I1.634}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Kasiviswanathan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KleinMS14, author = {Martin Klein and Thomas Mathew and Bimal Sinha}, title = {Noise Multiplication for Statistical Disclosure Control of Extreme Values in Log-normal Regression Samples}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {1}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i1.637}, doi = {10.29012/JPC.V6I1.637}, timestamp = {Thu, 10 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/KleinMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LiccardiPW14, author = {Ilaria Liccardi and Joseph Pato and Daniel J. Weitzner}, title = {Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v5i2.630}, doi = {10.29012/JPC.V5I2.630}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/LiccardiPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LinK14, author = {Bing{-}Rong Lin and Dan Kifer}, title = {Towards a Systematic Analysis of Privacy Definitions}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v5i2.631}, doi = {10.29012/JPC.V5I2.631}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LinK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NiedermeyerSKS14, author = {Frank Niedermeyer and Simone Steinmetzer and Martin Kroll and Rainer Schnell}, title = {Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record Linkage}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i2.640}, doi = {10.29012/JPC.V6I2.640}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/NiedermeyerSKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ReiterWZ14, author = {Jerome P. Reiter and Quanli Wang and Biyuan Zhang}, title = {Bayesian Estimation of Disclosure Risks for Multiply Imputed, Synthetic Data}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {1}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i1.635}, doi = {10.29012/JPC.V6I1.635}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/ReiterWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SmithE14, author = {Duncan Smith and Mark J. Elliot}, title = {A Graph-based Approach to Key Variable Mapping}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i2.641}, doi = {10.29012/JPC.V6I2.641}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/SmithE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/TudorCS14, author = {Caroline Tudor and George Cornish and Keith Spicer}, title = {Intruder Testing on the 2011 {UK} Census: Providing Practical Evidence for Disclosure Protection}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v5i2.632}, doi = {10.29012/JPC.V5I2.632}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/TudorCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/VatsalanCOV14, author = {Dinusha Vatsalan and Peter Christen and Christine M. O'Keefe and Vassilios S. Verykios}, title = {An Evaluation Framework for Privacy-Preserving Record Linkage}, journal = {J. Priv. Confidentiality}, volume = {6}, number = {1}, year = {2014}, url = {https://doi.org/10.29012/jpc.v6i1.636}, doi = {10.29012/JPC.V6I1.636}, timestamp = {Thu, 24 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/VatsalanCOV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WrightS14, author = {Stephen E. Wright and Byran J. Smucker}, title = {An Intuitive Formulation and Solution of the Exact Cell-Bounding Problem for Contingency Tables of Conditional Frequencies}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v5i2.633}, doi = {10.29012/JPC.V5I2.633}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WrightS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AbowdSV13, author = {John M. Abowd and Matthew J. Schneider and Lars Vilhuber}, title = {Differential Privacy Applications to Bayesian and Linear Mixed Model Estimation}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.627}, doi = {10.29012/JPC.V5I1.627}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AbowdSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg13, author = {Stephen E. Fienberg}, title = {Is the Privacy of Network Data an Oxymoron?}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.619}, doi = {10.29012/JPC.V4I2.619}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/HallWR13, author = {Robert J. Hall and Larry A. Wasserman and Alessandro Rinaldo}, title = {Random Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.621}, doi = {10.29012/JPC.V4I2.621}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/HallWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KenthapadiKMM13, author = {Krishnaram Kenthapadi and Aleksandra Korolova and Ilya Mironov and Nina Mishra}, title = {Privacy via the Johnson-Lindenstrauss Transform}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.625}, doi = {10.29012/JPC.V5I1.625}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/KenthapadiKMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kifer13, author = {Dan Kifer}, title = {Introduction to Special Section}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.626}, doi = {10.29012/JPC.V5I1.626}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Kifer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kraus13, author = {Rebecca S. Kraus}, title = {Statistical D{\'{e}}j{\`{a}} Vu: The National Data Center Proposal of 1965 and Its Descendants}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.624}, doi = {10.29012/JPC.V5I1.624}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Kraus13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LeeKO13, author = {Joo Ho Lee and In Yong Kim and Christine M. O'Keefe}, title = {On Regression-Tree-Based Synthetic Data Methods for Business Data}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.628}, doi = {10.29012/JPC.V5I1.628}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/LeeKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LinW13, author = {Yan{-}Xia Lin and Phillip Wise}, title = {Estimation of Regression Parameters from Noise Multiplied Data}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.622}, doi = {10.29012/JPC.V4I2.622}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/LinW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/StutzmanGA13, author = {Fred Stutzman and Ralph Gross and Alessandro Acquisti}, title = {Silent Listeners: The Evolution of Privacy and Disclosure on Facebook}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.620}, doi = {10.29012/JPC.V4I2.620}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/StutzmanGA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/UhlerSF13, author = {Caroline Uhler and Aleksandra B. Slavkovic and Stephen E. Fienberg}, title = {Privacy-Preserving Data Sharing for Genome-Wide Association Studies}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {1}, year = {2013}, url = {https://doi.org/10.29012/jpc.v5i1.629}, doi = {10.29012/JPC.V5I1.629}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/UhlerSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/X13, title = {Consumer Data Privacy in a Networked World: {A} Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {2}, year = {2013}, url = {https://doi.org/10.29012/jpc.v4i2.623}, doi = {10.29012/JPC.V4I2.623}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/X13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/FienbergJ12, author = {Stephen E. Fienberg and Jiashun Jin}, title = {Privacy-Preserving Data Sharing in High Dimensional Regression and Classification Settings}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.618}, doi = {10.29012/JPC.V4I1.618}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/FienbergJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KiferL12, author = {Daniel Kifer and Bing{-}Rong Lin}, title = {An Axiomatic View of Statistical Privacy and Utility}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.610}, doi = {10.29012/JPC.V4I1.610}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KiferL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/McClureR12, author = {David McClure and Jerome P. Reiter}, title = {Towards Providing Automated Feedback on the Quality of Inferences from Synthetic Datasets}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.616}, doi = {10.29012/JPC.V4I1.616}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/McClureR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NardiFH12, author = {Yuval Nardi and Stephen E. Fienberg and Robert J. Hall}, title = {Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.617}, doi = {10.29012/JPC.V4I1.617}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/NardiFH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/OKeefeSML12, author = {Christine M. O'Keefe and Ross Stewart Sparks and Damien McAullay and Bronwyn Loong}, title = {Confidentialising Survival Analysis Output in a Remote Data Access System}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.614}, doi = {10.29012/JPC.V4I1.614}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/OKeefeSML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/RubinsteinBHT12, author = {Benjamin I. P. Rubinstein and Peter L. Bartlett and Ling Huang and Nina Taft}, title = {Learning in a Large Function Space: Privacy-Preserving Mechanisms for {SVM} Learning}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.612}, doi = {10.29012/JPC.V4I1.612}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/RubinsteinBHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ShlomoS12, author = {Natalie Shlomo and Chris J. Skinner}, title = {Privacy Protection from Sampling and Perturbation in Survey Microdata}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.615}, doi = {10.29012/JPC.V4I1.615}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/ShlomoS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/SlavkovicS12, author = {Aleksandra B. Slavkovic and Adam D. Smith}, title = {Special Issue on Statistical and Learning-Theoretic Challenges in Data Privacy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.609}, doi = {10.29012/JPC.V4I1.609}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/SlavkovicS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Wasserman12, author = {Larry A. Wasserman}, title = {Minimaxity, Statistical Thinking and Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.611}, doi = {10.29012/JPC.V4I1.611}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Wasserman12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/YangFR12, author = {Xiaolin Yang and Stephen E. Fienberg and Alessandro Rinaldo}, title = {Differential Privacy for Protecting Multi-dimensional Contingency Table Data: Extensions and Applications}, journal = {J. Priv. Confidentiality}, volume = {4}, number = {1}, year = {2012}, url = {https://doi.org/10.29012/jpc.v4i1.613}, doi = {10.29012/JPC.V4I1.613}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/YangFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Charest11, author = {Anne{-}Sophie Charest}, title = {How Can We Analyze Differentially-Private Synthetic Datasets?}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v2i2.589}, doi = {10.29012/JPC.V2I2.589}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Charest11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Commission11, author = {Federal Trade Commission}, title = {Protecting Consumer Privacy in an Era of Rapid Change - {A} Proposed Framework for Businesses and Policymakers (Preliminary {FTC} Staff Report)}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.596}, doi = {10.29012/JPC.V3I1.596}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Commission11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Duncan11, author = {George Duncan}, title = {Commentary: Future {U.S.} National Statistics Use of Administrative Data}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.603}, doi = {10.29012/JPC.V3I2.603}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Duncan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg11, author = {Stephen E. Fienberg}, title = {Editorial: In This Issue}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.592}, doi = {10.29012/JPC.V3I1.592}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg11a, author = {Stephen E. Fienberg}, title = {In This Issue}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.598}, doi = {10.29012/JPC.V3I2.598}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg11b, author = {Stephen E. Fienberg}, title = {Toward a Reconceptualization of Confidentiality Protection in the Context of Linkages with Administrative Records}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.604}, doi = {10.29012/JPC.V3I2.604}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg11c, author = {Stephen E. Fienberg}, title = {In This Issue}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v2i2.587}, doi = {10.29012/JPC.V2I2.587}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Force11, author = {The Department of Commerce Internet Policy Task Force}, title = {Commercial Data Privacy and Innovation in the Internet Economy: {A} Dynamic Policy Framework}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.597}, doi = {10.29012/JPC.V3I1.597}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Force11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Gates11, author = {Gerald W. Gates}, title = {How Uncertainty about Privacy and Confidentiality is Hampering Efforts to More Effectively Use Administrative Records in Producing {U.S.} National Statistics}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.599}, doi = {10.29012/JPC.V3I2.599}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Gates11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Gates11a, author = {Gerald W. Gates}, title = {Rejoinder}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.608}, doi = {10.29012/JPC.V3I2.608}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Gates11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KinneyRB11, author = {Satkartar K. Kinney and Jerome P. Reiter and James O. Berger}, title = {Model Selection when multiple imputation is used to protect confidentiality in public use data}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v2i2.588}, doi = {10.29012/JPC.V2I2.588}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KinneyRB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Korolova11, author = {Aleksandra Korolova}, title = {Privacy Violations Using Microtargeted Ads: {A} Case Study}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.594}, doi = {10.29012/JPC.V3I1.594}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Korolova11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Lane11, author = {Julia Ingrid Lane}, title = {A Dissenting View from Julia Lane}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.601}, doi = {10.29012/JPC.V3I2.601}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Lane11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Lindell11, author = {Yehuda Lindell}, title = {Anonymous Authentication}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v2i2.590}, doi = {10.29012/JPC.V2I2.590}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Lindell11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Madans11, author = {Jennifer H. Madans}, title = {Use of Administrative Records and the Privacy-Confidentiality Trade-off}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.602}, doi = {10.29012/JPC.V3I2.602}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Madans11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Merener11, author = {Martin M. Merener}, title = {Polynomial-time Attack on Output Perturbation Sanitizers for Real-valued Databases}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v2i2.591}, doi = {10.29012/JPC.V2I2.591}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Merener11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Prewitt11, author = {Kenneth Prewitt}, title = {Why It Matters to Distinguish Between Privacy and Confidentiality}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.600}, doi = {10.29012/JPC.V3I2.600}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Prewitt11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Reiter11, author = {Jerome P. Reiter}, title = {Comment on Article by Gates}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.605}, doi = {10.29012/JPC.V3I2.605}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Reiter11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Scheuren11, author = {Fritz J. Scheuren}, title = {Trust but Pre-Verify?}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.606}, doi = {10.29012/JPC.V3I2.606}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Scheuren11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Simpson11, author = {Andrew C. Simpson}, title = {On Privacy and Public Data: a Study of data.gov.uk}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.595}, doi = {10.29012/JPC.V3I1.595}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Simpson11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ToubianaN11, author = {Vincent Toubiana and Helen Nissenbaum}, title = {An Analysis of Google Logs Retention Policies}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {1}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i1.593}, doi = {10.29012/JPC.V3I1.593}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/ToubianaN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Zaslavsky11, author = {Alan M. Zaslavsky}, title = {Privacy and the Statistician: What Do We Need to Know to Certify Nondisclosure?}, journal = {J. Priv. Confidentiality}, volume = {3}, number = {2}, year = {2011}, url = {https://doi.org/10.29012/jpc.v3i2.607}, doi = {10.29012/JPC.V3I2.607}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Zaslavsky11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Cox10, author = {Lawrence H. Cox}, title = {Vulnerability of Complementary Cell Suppression to Intruder Attack}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.576}, doi = {10.29012/JPC.V1I2.576}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Cox10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkN10, author = {Cynthia Dwork and Moni Naor}, title = {On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.585}, doi = {10.29012/JPC.V2I1.585}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/DworkS10, author = {Cynthia Dwork and Adam D. Smith}, title = {Differential Privacy for Statistics: What we Know and What we Want to Learn}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.570}, doi = {10.29012/JPC.V1I2.570}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/DworkS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg10, author = {Stephen E. Fienberg}, title = {Editorial: In This Issue}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.578}, doi = {10.29012/JPC.V2I1.578}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Fienberg10a, author = {Stephen E. Fienberg}, title = {The Relevance or Irrelevance of Weights for Confidentiality and Statistical Analyses}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.572}, doi = {10.29012/JPC.V1I2.572}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Fienberg10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Karr10, author = {Alan F. Karr}, title = {Secure Statistical Analysis of Distributed Databases, Emphasizing What We Don't Know}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.573}, doi = {10.29012/JPC.V1I2.573}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Karr10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KinneyKG10, author = {Satkartar K. Kinney and Alan F. Karr and Joe Fred Gonzalez Jr.}, title = {Data Confidentiality: The Next Five Years Summary and Guide to Papers}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.569}, doi = {10.29012/JPC.V1I2.569}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KinneyKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LinK10, author = {Xiaodong Lin and Alan F. Karr}, title = {Privacy-preserving Maximum Likelihood Estimation for Distributed Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.574}, doi = {10.29012/JPC.V1I2.574}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LinK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/NabarM10, author = {Shubha U. Nabar and Nina Mishra}, title = {Releasing Private Contingency Tables}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.586}, doi = {10.29012/JPC.V2I1.586}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/NabarM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/PerryV10, author = {William J. Perry and Charles M. Vest}, title = {Protecting Individual Privacy in the Struggle Against Terrorists{\textemdash}A Framework for Program Assessment: Executive Summary}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.582}, doi = {10.29012/JPC.V2I1.582}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/PerryV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/PerryV10a, author = {William J. Perry and Charles M. Vest}, title = {The Science and Technology of Privacy Protection: Appendix {L} of "Protecting Individual Privacy in the Struggle Against Terrorists"}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.583}, doi = {10.29012/JPC.V2I1.583}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/PerryV10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Reiter10, author = {Jerome P. Reiter}, title = {Multiple Imputation for Disclosure Limitation: Future Research Challenges}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.575}, doi = {10.29012/JPC.V1I2.575}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Reiter10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Schneier10, author = {Bruce Schneier}, title = {Schneier on Security: Privacy and Control}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.579}, doi = {10.29012/JPC.V2I1.579}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Schneier10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Shlomo10, author = {Natalie Shlomo}, title = {Releasing Microdata: Disclosure Risk Estimation, Data Masking and Assessing Utility}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.584}, doi = {10.29012/JPC.V2I1.584}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/Shlomo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Singh10, author = {Avinash C. Singh}, title = {Maintaining Analytic Utility while Protecting Confidentiality of Survey and Nonsurvey Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.571}, doi = {10.29012/JPC.V1I2.571}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Singh10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Slavkovic10, author = {Aleksandra B. Slavkovic}, title = {Partial Information Releases for Confidential Contingency Table Entries: Present and Future Research Efforts}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {2}, year = {2010}, url = {https://doi.org/10.29012/jpc.v1i2.577}, doi = {10.29012/JPC.V1I2.577}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Slavkovic10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WaldoLC10, author = {James Waldo and Herbert S. Lin and Lawrence H. Cox}, title = {Thinking About Privacy: Chapter 1 of "Engaging Privacy and Information Technology in a Digital Age"}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.581}, doi = {10.29012/JPC.V2I1.581}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WaldoLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WaldoLM10, author = {James Waldo and Herbert S. Lin and Lynette I. Millett}, title = {Engaging Privacy and Information Technology in a Digital Age: Executive Summary}, journal = {J. Priv. Confidentiality}, volume = {2}, number = {1}, year = {2010}, url = {https://doi.org/10.29012/jpc.v2i1.580}, doi = {10.29012/JPC.V2I1.580}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/WaldoLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AbowdNS09, author = {John M. Abowd and Kobbi Nissim and Chris J. Skinner}, title = {First Issue Editorial}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.562}, doi = {10.29012/JPC.V1I1.562}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AbowdNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AndersonS09, author = {Margo J. Anderson and William Seltzer}, title = {Federal Statistical Confidentiality and Business Data: Twentieth Century Challenges and Continuing Issues}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.563}, doi = {10.29012/JPC.V1I1.563}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AndersonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/AndersonS09a, author = {Margo J. Anderson and William Seltzer}, title = {Rejoinder}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.565}, doi = {10.29012/JPC.V1I1.565}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/AndersonS09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/Kincannon09, author = {Charles L. Kincannon}, title = {Comment on Article by Anderson and Seltzer}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.564}, doi = {10.29012/JPC.V1I1.564}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/Kincannon09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LindellP09, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.566}, doi = {10.29012/JPC.V1I1.566}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/LindellP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/ReiterM09, author = {Jerome P. Reiter and Robin Mitra}, title = {Estimating Risks of Identification Disclosure in Partially Synthetic Data}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.567}, doi = {10.29012/JPC.V1I1.567}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/ReiterM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/WooROK09, author = {Mi{-}Ja Woo and Jerome P. Reiter and Anna Oganian and Alan F. Karr}, title = {Global Measures of Data Utility for Microdata Masked for Disclosure Limitation}, journal = {J. Priv. Confidentiality}, volume = {1}, number = {1}, year = {2009}, url = {https://doi.org/10.29012/jpc.v1i1.568}, doi = {10.29012/JPC.V1I1.568}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/WooROK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.