Randomized response is attractive for privacy preserving data collection because the provided privacy can be quantified by means such as differential privacy. However, recovering and analyzing statistics involving multiple dependent randomized binary attributes can be difficult, posing a significant barrier to use. In this work, we address this problem by identifying and analyzing a family of response randomizers that change each binary attribute independently with the same probability. Modes of Google’s Rappor randomizer as well as applications of two well-known classical randomized response methods, Warner’s original method and Simmons’ unrelated question method, belong to this family. We show that randomizers in this family transform mul...
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to u...
Abstract The collection and analysis of user data drives improvements in the app and web ecosystems,...
Post Randomization Methods (PRAM) are among the most popular disclosure limitation techniques for bo...
This paper studies how to enforce differential privacy by using the randomized response in the data ...
Randomization has emerged as an important approach for data disguising in Privacy-Preserving Data Pu...
We examine a generalised Randomised Response (RR) technique in the context of differential privacy a...
Moving from the scrambling mechanism recently suggested by Saha [25], three scrambled randomized res...
The randomized response (RR) technique is a promising technique to disguise private categorical data...
In many socio-economic surveys, the variable of interest is sensitive or stig-matizing. Examples inc...
Dissemination of data with sensitive information has an implicit risk of unauthorized disclosure. Se...
International audienceIn a variety of contexts, randomization is regarded as an effective technique ...
In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive i...
It is a challenging concern in data collecting, publishing, and mining when personal information is ...
In this paper, we compared our newly developed Randomized Response Technique (RRT) with that of Huss...
We consider a setup in which confidential i.i.d. samples $X_1,\dotsc,X_n$ from an unknown finite-sup...
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to u...
Abstract The collection and analysis of user data drives improvements in the app and web ecosystems,...
Post Randomization Methods (PRAM) are among the most popular disclosure limitation techniques for bo...
This paper studies how to enforce differential privacy by using the randomized response in the data ...
Randomization has emerged as an important approach for data disguising in Privacy-Preserving Data Pu...
We examine a generalised Randomised Response (RR) technique in the context of differential privacy a...
Moving from the scrambling mechanism recently suggested by Saha [25], three scrambled randomized res...
The randomized response (RR) technique is a promising technique to disguise private categorical data...
In many socio-economic surveys, the variable of interest is sensitive or stig-matizing. Examples inc...
Dissemination of data with sensitive information has an implicit risk of unauthorized disclosure. Se...
International audienceIn a variety of contexts, randomization is regarded as an effective technique ...
In a variety of contexts, randomization is regarded as an effective technique to conceal sensitive i...
It is a challenging concern in data collecting, publishing, and mining when personal information is ...
In this paper, we compared our newly developed Randomized Response Technique (RRT) with that of Huss...
We consider a setup in which confidential i.i.d. samples $X_1,\dotsc,X_n$ from an unknown finite-sup...
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to u...
Abstract The collection and analysis of user data drives improvements in the app and web ecosystems,...
Post Randomization Methods (PRAM) are among the most popular disclosure limitation techniques for bo...