Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jpc/jpc13.bht:"
@article{DBLP:journals/jpc/BenedettoT23, author = {Gary Benedetto and Evan Totty}, title = {Synthesizing Familial Linkages for Privacy in Microdata}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.767}, doi = {10.29012/JPC.767}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/BenedettoT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/CummingsKR23, author = {Rachel Cummings and Gabriel Kaptchuk and Elissa M. Redmiles}, title = {"I need a better description": An Investigation Into User Expectations For Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.813}, doi = {10.29012/JPC.813}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/CummingsKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/EtzKP23, author = {Kathy Etz and Heather Kimmel and Amy Pienta}, title = {National Addiction and {HIV} Data Archive Program: Developing an Approach for Reuse of Sensitive and Confidential Data}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.853}, doi = {10.29012/JPC.853}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/EtzKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GreenR23, author = {Elizabeth Green and Felix Ritchie}, title = {The present and future of the Five Safes framework}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.831}, doi = {10.29012/JPC.831}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/GreenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/GreenR23a, author = {Elizabeth Green and Felix Ritchie}, title = {Using pedagogical and psychological insights to train analysts using confidential data}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.842}, doi = {10.29012/JPC.842}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/GreenR23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/JahanaraACRS23, author = {MohammadMahdi Jahanara and Vahid R. Asadi and Marco Carmosino and Akbar Rafiey and Bahar Salamatian}, title = {Private Boosted Decision Trees via Smooth Re-Weighting}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.808}, doi = {10.29012/JPC.808}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/JahanaraACRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/JangPLS23, author = {Joy Bohyun Jang and Amy M. Pienta and Margaret Levenstein and Joe Saul}, title = {Restricted data management: the current practice and the future}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.844}, doi = {10.29012/JPC.844}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/JangPLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/KarcherSW23, author = {Sebastian Karcher and Sefa Secen and Nicholas Weber}, title = {Protecting Sensitive Data Early in the Research Data Lifecycle}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.846}, doi = {10.29012/JPC.846}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/KarcherSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/MarcotteRO23, author = {John E. Marcotte and Sarah Rush and Kelly Ogden{-}Schuette}, title = {Tiered Access to Research Data for Secondary Analysis}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.825}, doi = {10.29012/JPC.825}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/MarcotteRO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/McKennaMHM23, author = {Ryan McKenna and Gerome Miklau and Michael Hay and Ashwin Machanavajjhala}, title = {Optimizing Error of High-Dimensional Statistical Queries Under Differential Privacy}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {1}, year = {2023}, url = {https://doi.org/10.29012/jpc.791}, doi = {10.29012/JPC.791}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/McKennaMHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/PientaJL23, author = {Amy M. Pienta and Joy Jang and Margaret Levenstein}, title = {Beyond Legal Frameworks and Security Controls For Accessing Confidential Survey Data: Engaging Data Users in Data Protection}, journal = {J. Priv. Confidentiality}, volume = {13}, number = {2}, year = {2023}, url = {https://doi.org/10.29012/jpc.845}, doi = {10.29012/JPC.845}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpc/PientaJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.