Tian et al., 2015
| Publication | Publication Date | Title |
|---|---|---|
| El Ouadrhiri et al. | Differential privacy for deep and federated learning: A survey | |
| Wang et al. | Searchable encryption over feature-rich data | |
| Sarwate et al. | Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data | |
| Vatsalan et al. | Privacy-preserving record linkage for big data: Current approaches and research challenges | |
| Ghinita et al. | Private queries in location based services: anonymizers are not necessary | |
| Oliveira et al. | Privacy preserving clustering by data transformation | |
| Aggarwal et al. | A general survey of privacy-preserving data mining models and algorithms | |
| Dwork | A firm foundation for private data analysis | |
| Li et al. | Slicing: A new approach for privacy preserving data publishing | |
| Cuzzocrea et al. | Privacy preserving OLAP over distributed XML data: a theoretically-sound secure-multiparty-computation approach | |
| Okkalioglu et al. | A survey: deriving private information from perturbed data | |
| Ye et al. | Secure and efficient outsourcing differential privacy data release scheme in cyber–physical system | |
| Liu et al. | Face image publication based on differential privacy | |
| O'Keefe et al. | A summary of attack methods and confidentiality protection measures for fully automated remote analysis systems | |
| Madan et al. | Adaptive privacy preservation approach for big data publishing in cloud using k-anonymization | |
| Katsomallos et al. | Privacy, space and time: A survey on privacy-preserving continuous data publishing | |
| Zainab et al. | Sensitive and private data analysis: A systematic review | |
| Tzouramanis et al. | Secure reverse k-nearest neighbours search over encrypted multi-dimensional databases | |
| Lu et al. | Practical inference control for data cubes | |
| Sang et al. | Achieving probabilistic anonymity in a linear and hybrid randomization model | |
| Eklund et al. | BMI: Bounded Mutual Information for Efficient Privacy-Preserving Feature Selection | |
| Lin | Privacy-preserving kernel k-means outsourcing with randomized kernels | |
| Chen et al. | A new encrypted image retrieval method based on feature fusion in cloud computing | |
| Ritchie et al. | Confidentiality and linked data | |
| Tian et al. | A DCT‐based privacy‐preserving approach for efficient data mining |