Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382263
|View full text |Cite
|
Sign up to set email alerts
|

Differentially private sequential data publication via variable-length n-grams

Abstract: Sequential data is being increasingly used in a variety of applications. Publishing sequential data is of vital importance to the advancement of these applications. However, as shown by the re-identification attacks on the AOL and Netflix datasets, releasing sequential data may pose considerable threats to individual privacy. Recent research has indicated the failure of existing sanitization techniques to provide claimed privacy guarantees. It is therefore urgent to respond to this failure by developing new sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
224
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 221 publications
(225 citation statements)
references
References 22 publications
0
224
1
Order By: Relevance
“…Compared with the state of the art of sequential pattern mining [6], our approach provides comparable results for frequent substring patterns, while achieving significantly superior results for mining frequent prefixes at the same time.…”
Section: Transformation and Refinementmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with the state of the art of sequential pattern mining [6], our approach provides comparable results for frequent substring patterns, while achieving significantly superior results for mining frequent prefixes at the same time.…”
Section: Transformation and Refinementmentioning
confidence: 99%
“…Proceedings of the VLDB Endowment, Vol. 6,No. 12 Copyright 2013 VLDB Endowment 2150-8097/13/10... $ 10.00. retailers in develop marketing strategies.…”
Section: Introductionmentioning
confidence: 99%
“…As examples, both compositions are usually used in building partitioning trees for data summary under differential privacy [9,17,23,24].…”
Section: Composabilitymentioning
confidence: 99%
“…To publish sequential data like Web browsing histories and mobility traces in private settings, Chen et al [24] employed a variable-length n-gram model, which is widely used in natural language processing, to extract essential information from a sequential dataset and build an exploration tree satisfying ε-DP. Synthetic data constructed from the tree can be safely used by analysts.…”
Section: ) Partitioningmentioning
confidence: 99%
“…Due to its nature, this approach is quite effective for prefix patterns but the results for substring patterns are quite poor. Recently, Chen et al [9] proposed an alternative way for mining sequential patterns. They first reduce the dimensionality of the pattern space by restricting the mining on short patterns (n-grams), and second use the Markov assumption to construct a sanitized dataset using the noisy patterns.…”
Section: Introductionmentioning
confidence: 99%