2016
DOI: 10.1007/978-3-319-45381-1_11
|View full text |Cite
|
Sign up to set email alerts
|

Correcting Finite Sampling Issues in Entropy l-diversity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The empirical counts n i are used to obtain maximum-likelihood estimators of the respective pi = n i /L, where L = ∑ i n i is the number of all observations. Note that for "small" L, we would need to include corrections to the Shannon entropy formula to account for small coverage [12][13][14] for which efficient computational methods exist [15]. In this study, we deal with a synthetic dataset and two real-life ones that are sufficiently large so that we can avoid this complication here.…”
Section: Methodsmentioning
confidence: 99%
“…The empirical counts n i are used to obtain maximum-likelihood estimators of the respective pi = n i /L, where L = ∑ i n i is the number of all observations. Note that for "small" L, we would need to include corrections to the Shannon entropy formula to account for small coverage [12][13][14] for which efficient computational methods exist [15]. In this study, we deal with a synthetic dataset and two real-life ones that are sufficiently large so that we can avoid this complication here.…”
Section: Methodsmentioning
confidence: 99%
“…The development of new data anonymization methods is another area in which ARX is frequently utilized. An interesting example is the work by Stammler et al, who have used ARX to implement and evaluate an enhanced variant of the ℓ‐diversity privacy model which uses an asymptotically unbiased estimator for the Shannon entropy . Li et al have proposed and implemented a graph‐based framework for privacy‐preserving data publishing, which they evaluated by comparing the output of their framework with the output of ARX .…”
Section: Summary and Practical Experiencesmentioning
confidence: 99%
“…Other approaches use k-anonymity [58], l-diversity [18,56], or differential privacy [42,51] to securely perform GWAS on distributed datasets. Nevertheless, several attacks were proposed shortly after: [25,59,61].…”
Section: Motivationmentioning
confidence: 99%