Abstract is missing.
- Symmetric vs Asymmetric Protection Levels in SDC Methods for Tabular DataDaniel Baena, Jordi Castro, José A. González 0002. 3-12 [doi]
- Bounded Small Cell Adjustments for Flexible Frequency Table GeneratorsMin-Jeong Park. 13-27 [doi]
- Designing Confidentiality on the Fly Methodology - Three AspectsTobias Enderle, Sarah Giessing, Reinhard Tent. 28-42 [doi]
- Protecting Census 2021 Origin-Destination Data Using a Combination of Cell-Key Perturbation and SuppressionIain Dove, Christos Ntoumos, Keith Spicer. 43-55 [doi]
- On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker PerspectiveNicolás Ruiz, Krishnamurty Muralidhar, Josep Domingo-Ferrer. 59-74 [doi]
- The Quasi-Multinomial Synthesizer for Categorical DataJingchen Hu, Nobuaki Hoshino. 75-91 [doi]
- Synthetic Data via Quantile Regression for Heavy-Tailed and Heteroskedastic DataMichelle Pistner, Aleksandra Slavkovic, Lars Vilhuber. 92-108 [doi]
- Some Clarifications Regarding Fully Synthetic DataJörg Drechsler. 109-121 [doi]
- Differential Correct Attribution Probability for Synthetic Data: An ExplorationJennifer Taub, Mark Elliot, Maria Pampaka, Duncan Smith. 122-137 [doi]
- pMSE Mechanism: Differentially Private Synthetic Data with Maximal Distributional SimilarityJoshua Snoke, Aleksandra Slavkovic. 138-159 [doi]
- The Application of Genetic Algorithms to Data Synthesis: A Comparison of Three Crossover MethodsYingrui Chen, Mark Elliot, Duncan Smith. 160-171 [doi]
- Multiparty Computation with Statistical Input Confidentiality via Randomized ResponseJosep Domingo-Ferrer, Rafael Mulero-Vellido, Jordi Soria-Comas. 175-186 [doi]
- Grouping of Variables to Facilitate SDL Methods in Multivariate Data SetsAnna Oganian, Ionut Iacob, Goran Lesaja. 187-199 [doi]
- Comparative Study of the Effectiveness of Perturbative Methods for Creating Official Microdata in JapanShinsuke Ito, Toru Yoshitake, Ryo Kikuchi, Fumika Akutsu. 200-214 [doi]
- A General Framework and Metrics for Longitudinal Data AnonymizationNicolás Ruiz. 215-230 [doi]
- Reviewing the Methods of Estimating the Density Function Based on Masked DataYan-Xia Lin, Pavel N. Krivitsky. 231-246 [doi]
- Protecting Values Close to Zero Under the Multiplicative Noise MethodYan-Xia Lin. 247-262 [doi]
- Efficiency and Sample Size Determination of Protected DataBradley Wakefield, Yan-Xia Lin. 263-278 [doi]
- Quantifying the Protection Level of a Noise Candidate for Noise Multiplication Masking SchemeYue Ma, Yan-Xia Lin, Pavel N. Krivitsky, Bradley Wakefield. 279-293 [doi]
- Generalized Bayesian Record Linkage and Regression with Exact Error PropagationRebecca C. Steorts, Andrea Tancredi, Brunero Liseo. 297-313 [doi]
- Probabilistic Blocking with an Application to the Syrian ConflictRebecca C. Steorts, Anshumali Shrivastava. 314-327 [doi]
- SwapMob: Swapping Trajectories for Mobility AnonymizationJulián Salas, David Megías, Vicenç Torra. 331-346 [doi]
- Safely Plotting Continuous Variables on a MapPeter-Paul de Wolf, Edwin de Jonge. 347-359 [doi]