000 | 05273nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-031-13945-1 | ||
003 | DE-He213 | ||
005 | 20240730165523.0 | ||
007 | cr nn 008mamaa | ||
008 | 220804s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031139451 _9978-3-031-13945-1 |
||
024 | 7 |
_a10.1007/978-3-031-13945-1 _2doi |
|
050 | 4 | _aQA76.9.D343 | |
072 | 7 |
_aUNF _2bicssc |
|
072 | 7 |
_aUYQE _2bicssc |
|
072 | 7 |
_aCOM021030 _2bisacsh |
|
072 | 7 |
_aUNF _2thema |
|
072 | 7 |
_aUYQE _2thema |
|
082 | 0 | 4 |
_a006.312 _223 |
245 | 1 | 0 |
_aPrivacy in Statistical Databases _h[electronic resource] : _bInternational Conference, PSD 2022, Paris, France, September 21-23, 2022, Proceedings / _cedited by Josep Domingo-Ferrer, Maryline Laurent. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXI, 376 p. 98 illus., 66 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13463 |
|
505 | 0 | _aPrivacy models -- An optimization-based decomposition heuristic for the microaggregation problem -- Privacy Analysis with a Distributed Transition System and a data-wise metric -- Multivariate Mean Comparison under Differential Privacy -- Asking The Proper Question: Adjusting Queries To Statistical Procedures Under Differential Privacy -- Towards integrally private clustering: overlapping clusters for high privacy guarantees -- Tabular data -- Perspectives for Tabular Data Protection - How About Synthetic Data? -- On Privacy of Multidimensional Data Against Aggregate Knowledge Attacks -- Synthetic Decimal Numbers as a Flexible Tool for Suppression of Post-published Tabular Data -- Disclosure risk assessment and record linkage -- The risk of disclosure when reporting commonly used univariate statistics -- Privacy-Preserving protocols -- Tit-for-Tat Disclosure of a Binding Sequence of User Analysesin Safe Data Access Centers -- Secure and non-interactive k-NN classifier using symmetric fully homomorphic encryption -- Unstructured and mobility data -- Automatic evaluation of disclosure risks of text anonymization methods -- Generation of Synthetic Trajectory Microdata from Language Models -- Synthetic data -- Synthetic Individual Income Tax Data: Methodology, Utility, and Privacy Implications -- On integrating the number of synthetic data sets m into the a priori synthesis approach -- Challenges in Measuring Utility for Fully Synthetic Data -- Comparing the Utility and Disclosure Risk of Synthetic Data with Samples of Microdata -- Utility and Disclosure Risk for Differentially Private Synthetic Categorical Data -- Machine learning and privacy -- Membership Inference Attack Against Principal Component Analysis -- When Machine Learning Models Leak: An Exploration of Synthetic Training Data -- Case studies -- A Note on the Misinterpretation of the US Census Re-identification Attack -- A Re-examination of the Census Bureau Reconstruction and Reidentification Attack -- Quality Assessment of the 2014 to 2019 National Survey on Drug Use and Health (NSDUH) Public Use Files -- Privacy in Practice: Latest Achievements of the EUSTAT SDC group -- How Adversarial Assumptions Influence Re- identification Risk Measures: A COVID-19 Case Study. | |
520 | _aThis book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022. The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies. | ||
650 | 0 |
_aData mining. _93907 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData Mining and Knowledge Discovery. _989331 |
650 | 2 | 4 |
_aDatabase Management. _93157 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _989332 |
700 | 1 |
_aDomingo-Ferrer, Josep. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989333 |
|
700 | 1 |
_aLaurent, Maryline. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _989334 |
|
710 | 2 |
_aSpringerLink (Online service) _989335 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031139444 |
776 | 0 | 8 |
_iPrinted edition: _z9783031139468 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13463 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-13945-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86366 _d86366 |