Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
2
views
13
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,750
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
PRICAI 2014: Trends in Artificial Intelligence
Privacy Preserving in Location Data Release: A Differential Privacy Approach
other
Author(s):
Ping Xiong
,
Tianqing Zhu
,
Lei Pan
,
Wenjia Niu
,
Gang Li
Publication date
(Print):
2014
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Big Data Privacy
Most cited references
13
Record
: found
Abstract
: not found
Book Chapter
: not found
Differential Privacy
Cynthia Dwork
(2006)
0
comments
Cited
375
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Quantifying Location Privacy
Jean-Pierre Hubaux
,
Jean-Yves Le Boudec
,
George Theodorakopoulos
…
(2011)
0
comments
Cited
63
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Practical privacy
Avrim Blum
,
Cynthia Dwork
,
Frank McSherry
…
(2005)
0
comments
Cited
60
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2014
Pages
: 183-195
DOI:
10.1007/978-3-319-13560-1_15
SO-VID:
b39c73c6-516d-49c3-811f-201bba759c26
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Subpopulation Diversity Based Setting Success Rate of Migration for Distributed Evolutionary Algorithms
pp. 13
A More Expressive Behavioral Logic for Decision-Theoretic Planning
pp. 26
Detecting Keyphrases in Micro-blogging with Graph Modeling of Information Diffusion
pp. 39
Fast BMU Search in SOMs Using Random Hyperplane Trees
pp. 52
Robust Abrupt Motion Tracking via Adaptive Hamiltonian Monte Carlo Sampling
pp. 64
Integrating Case-Based Reasoning with Reinforcement Learning for Real-Time Strategy Game Micromanagement
pp. 77
A Topological Characterisation of Belief Revision over Infinite Propositional Languages
pp. 91
Enhancing Binary Relevance for Multi-label Learning with Controlled Label Correlations Exploitation
pp. 104
Detection of Rain in Acoustic Recordings of the Environment
pp. 117
Improved Feature Transformations for Classification Using Density Estimation
pp. 130
Exploiting Description Knowledge for Keyphrase Extraction
pp. 143
Amino Acids Pattern-Biased Spiral Search for Protein Structure Prediction
pp. 157
A HMM POS Tagger for Micro-blogging Type Texts
pp. 170
An Eye-Tracking Study of User Behavior in Web Image Search
pp. 183
Privacy Preserving in Location Data Release: A Differential Privacy Approach
pp. 196
DRWS: A Model for Learning Distributed Representations for Words and Sentences
pp. 221
Pivot-Based Bilingual Dictionary Extraction from Multiple Dictionary Resources
pp. 248
Reliable Fault Diagnosis of Low-Speed Bearing Defects Using a Genetic Algorithm
pp. 256
Intrinsic Learning of Dynamic Bayesian Networks
pp. 270
A Game Model with Private Goal and Belief
pp. 284
On Efficient Evolving Multi-Context Systems
pp. 297
Analyzing Mediator-Activity Effects for Trust-Network Evolution in Social Media
pp. 309
A Weighted Minimum Distance Using Hybridization of Particle Swarm Optimization and Bacterial Foraging
pp. 320
Discriminative Metric Learning for Shape Variation Object Tracking
pp. 333
Constraint-Based Evolutionary Local Search for Protein Structures with Secondary Motifs
pp. 345
A Fast and Robust Multi-color Object Detection Method with Application to Color Chart Detection
pp. 357
Region-Based Object Categorisation Using Relational Learning
pp. 370
Competitive Learning with Pairwise Constraints for Text
pp. 383
Hierarchical Meta-Rules for Scalable Meta-Learning
pp. 396
Combining Career Progression and Profile Matching in a Job Recommender System
pp. 409
IR Stereo Kinect: Improving Depth Images by Combining Structured Light with IR Stereo
pp. 422
Polynomially Bounded Forgetting
pp. 435
Similarity Search by Generating Pivots Based on Manhattan Distance
pp. 447
MDSR: An Eigenvector Approach to Core Analysis of Multiple Directed Graphs
pp. 459
BEST: An Efficient Algorithm for Mining Frequent Unordered Embedded Subtrees
pp. 472
Arduface: An Embedded System Analysis Tool
pp. 484
K-means Pattern Learning for Move Evaluation in the Game of Go
pp. 496
Semantic Interpretation of Requirements through Cognitive Grammar and Configuration
pp. 511
Rotation-Based Learning: A Novel Extension of Opposition-Based Learning
pp. 523
Complexity of Exploiting Privacy Violations in Strategic Argumentation
pp. 536
Efficient Vehicle Localization Based on Road-Boundary Maps
pp. 548
An Assessment of Online Semantic Annotators for the Keyword Extraction Task
pp. 561
Evaluation of Terminological Schema Matching and Its Implications for Schema Mapping
pp. 587
On Adding Inverse Features to the Description Logic $\mathcal{CFD}^{\forall}_{nc}$
pp. 600
Tracking Perceptually Indistinguishable Objects Using Spatial Reasoning
pp. 614
A Personalized Gesture Interaction System with User Identification Using Kinect
pp. 627
POPVI: A Probability-Based Optimal Policy Value Iteration Algorithm
pp. 640
Bidding with Fees and Setting Effective Fees in a Double Auction Marketplace
pp. 654
Grounding Epistemic Modality in Speakers’ Judgments
pp. 668
Exploring Review Content for Recommendation via Latent Factor Model
pp. 680
Question Classification Based on Fine-Grained PoS Annotation of Nouns and Interrogative Pronouns
pp. 694
Probabilistic Belief Revision via Imaging
pp. 708
Classification with Sign Random Projections
pp. 720
Cortically-Inspired Overcomplete Feature Learning for Colour Images
pp. 733
GDL Meets ATL: A Logic for Game Description and Strategic Reasoning
pp. 747
Towards Optimal Lifetime in Wireless Sensor Networks for QoS Guaranteed Service Selection
pp. 770
Constructing Consumer-Oriented Medical Terminology from the Web A Supervised Classifier Ensemble Approach
pp. 782
An AdaBoost for Efficient Use of Confidences of Weak Hypotheses on Text Categorization
pp. 795
Reasoning about Constraint Models
pp. 809
A Multi-objective Genetic Algorithm for Model Selection for Support Vector Machines
pp. 820
Fast Learning of Deep Neural Networks via Singular Value Decomposition
pp. 827
A Simple Approach to Solving Cooperative Path-Finding as Propositional Satisfiability Works Well
pp. 834
Gene Selection Based on Supervised Vector Representation of Genes
pp. 842
Wallace: Incorporating Search into Chatting
pp. 849
Symbiotic Evolution to Generate Chord Progression Consisting of Four Parts for a Music Composition System
pp. 856
Dialogue Management in Spoken Dialogue System with Visual Feedback
pp. 863
Content-Based Readability Assessment: A Study Using A Syllabic Alphabetic Language (Thai)
pp. 871
Quantified Coalition Logic for BDI-Agents: Completeness and Complexity
pp. 877
Using Asymmetric Associations for Commonsense Causality Detection
pp. 884
A Community-Based Collaborative Filtering System Dealing with Sparsity Problem and Data Imperfections
pp. 891
Effect of Weighting Factors and Unit-Selection Factors on Text Summarization
pp. 905
A Correlation Based Imputation Method for Incomplete Traffic Accident Data
pp. 913
A Method to Divide Stream Data of Scores over Review Sites
pp. 920
Shift from Forward to Backward Deliberation in Search of Reconciliation
pp. 929
Cost Sensitive Decision Forest and Voting for Software Defect Prediction
pp. 937
A Randomized Game-Tree Search Algorithm for Shogi Based on Bayesian Approach
pp. 945
Online Agent Logic Programming with oClingo
pp. 958
Grounding Dynamic Spatial Relations for Embodied (Robot) Interaction
pp. 985
Modeling the Tail of a Hyperexponential Distribution to Detect Abnormal Periods of Inactivity in Older Adults
pp. 998
Predicting Procedure Duration to Improve Scheduling of Elective Surgery
pp. 1010
Relational Agents to Promote eHealth Advice Adherence
pp. 1016
Predicting Consumer Familiarity with Health Topics by Query Formulation and Search Result Interaction
pp. 1023
Task-Based Wireless Mobile Agents Search and Deployment for Ad Hoc Network Establishment in Disaster Environments
pp. 1036
From a Local to a Global Perspective of Community Detection in Networks
pp. 1050
Managing Parking Fees Based on Massive Parking Accounting Data
pp. 1063
Accountable Individual Trust from Group Reputations in Multi-agent Systems
pp. 1076
An Innovative Approach for Predicting Both Negotiation Deadline and Utility in Multi-issue Negotiation
pp. 1089
LAKUBE: An Improved Multi-Armed Bandit Algorithm for Strongly Budget-Constrained Conditions on Collecting Large-Scale Sensor Network Data
pp. E1
Erratum: Reliable Fault Diagnosis of Low-Speed Bearing Defects Using a Genetic Algorithm
pp. 759
Predicting Stock Market Trends by Recurrent Deep Neural Networks
pp. 898
Domain Adaptive Neural Networks for Object Recognition
Similar content
1,750
How Acceptable Is This? How User Experience Factors Can Broaden our Understanding of The Acceptance of Privacy Trade-offs
Authors:
Verena Distler
,
Carine Lallemand
,
Vincent Koenig
Soteria: Provable defense against privacy leakage in federated learning from representation perspective
Authors:
Privacy, Confidentiality, and Safety Considerations for Conducting Geographic Momentary Assessment Studies Among Persons Who Use Drugs and Men Who Have Sex with Men
Authors:
Abby Rudolph
,
April M Young
,
Jennifer Havens
See all similar