Krishnamurty Muralidhar

Orcid: 0000-0002-7239-7356

According to our database1, Krishnamurty Muralidhar authored at least 42 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Moment-based density estimation of confidential micro-data: a computational statistics approach.
Stat. Comput., February, 2023

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning.
ACM Comput. Surv., 2023

An Examination of the Alleged Privacy Threats of Confidence-Ranked Reconstruction of Census Microdata.
CoRR, 2023

Database Reconstruction Is Not So Easy and Is Different from Reidentification.
CoRR, 2023

2022
A Re-examination of the Census Bureau Reconstruction and Reidentification Attack.
Proceedings of the Privacy in Statistical Databases - International Conference, 2022

2021
General Confidentiality and Utility Metrics for Privacy-Preserving Data Publishing Based on the Permutation Model.
IEEE Trans. Dependable Secur. Comput., 2021

2020
ε-Differential Privacy for Microdata Releases Does Not Guarantee Confidentiality (Let Alone Utility).
Proceedings of the Privacy in Statistical Databases, 2020

2018
Statistical Information Recovery from Multivariate Noise-Multiplied Data, a Computational Approach.
Trans. Data Priv., 2018

On the Privacy Guarantees of Synthetic Data: A Reassessment from the Maximum-Knowledge Attacker Perspective.
Proceedings of the Privacy in Statistical Databases, 2018

2016
New directions in anonymization: Permutation paradigm, verifiability by subjects and intruders, transparency to users.
Inf. Sci., 2016

Secure attribute sharing of linked microdata.
Decis. Support Syst., 2016

Rank-Based Record Linkage for Re-Identification Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2016

2015
A Bootstrap Mechanism for Response Masking in Remote Analysis Systems.
Decis. Sci., 2015

2014
Evaluating Re-Identification Risks of Data Protected by Additive Data Perturbation.
J. Database Manag., 2014

Reverse Mapping to Preserve the Marginal Distributions of Attributes in Masked Microdata.
Proceedings of the Privacy in Statistical Databases, 2014

Controlled Shuffling, Statistical Confidentiality and Microdata Utility: A Successful Experiment with a 10% Household Sample of the 2011 Population Census of Ireland for the IPUMS-International Database.
Proceedings of the Privacy in Statistical Databases, 2014

2012
Statistical Dependence as the Basis for a Privacy Measure for Microdata Release.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

An Investigation of Model-Based Microdata Masking for Magnitude Tabular Data Release.
Proceedings of the Privacy in Statistical Databases, 2012

Anonymization Methods for Taxonomic Microdata.
Proceedings of the Privacy in Statistical Databases, 2012

2011
Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data.
Trans. Data Priv., 2011

2010
Some Additional Insights on Applying Differential Privacy for Numeric Data.
Proceedings of the Privacy in Statistical Databases, 2010

Does Differential Privacy Protect Terry Gross' Privacy?
Proceedings of the Privacy in Statistical Databases, 2010

2008
Generating Sufficiency-based Non-Synthetic Perturbed Data.
Trans. Data Priv., 2008

A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation.
Proceedings of the Privacy in Statistical Databases, 2008

2007
Technical Note - Assessment of Disclosure Risk When Using Confidentiality via Camouflage.
Oper. Res., 2007

2006
Data Shuffling - A New Masking Approach for Numerical Data.
Manag. Sci., 2006

Secure and useful data sharing.
Decis. Support Syst., 2006

Why Swap When You Can Shuffle? A Comparison of the Proximity Swap and Data Shuffle for Numeric Data.
Proceedings of the Privacy in Statistical Databases, 2006

2005
An Enhanced Data Perturbation Approach for Small Data Sets.
Decis. Sci., 2005

Can You Have Your Cake and Eat It Too? Sharing Healthcare Data Without Compromising Privacy and Confidentiality.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2003
A rejoinder to the comments by Polettini and Stander.
Stat. Comput., 2003

A theoretical basis for perturbation methods.
Stat. Comput., 2003

2002
Monte Carlo Simulation.
Proceedings of the Encyclopedia of Information Systems, 2002

Perturbing Nonnormal Confidential Attributes: The Copula Approach.
Manag. Sci., 2002

The Security of Confidential Numerical Data in Databases.
Inf. Syst. Res., 2002

2001
An Improved Security Requirement for Data Perturbation with Implications for E-Commerce.
Decis. Sci., 2001

1999
Security of Random Data Perturbation Methods.
ACM Trans. Database Syst., 1999

1995
An investigation of the effectiveness of statistical distributions for additive fixed data perturbation.
Comput. Oper. Res., 1995

1991
Bootstrap confidence intervals for estimating audit value from skewed populations and small samples.
Simul., 1991

1990
Using the analytic hierarchy process for information system project selection.
Inf. Manag., 1990

1989
A simulation procedure for sample size determination in electric utility load research.
Simul., 1989

The evolution of an expert DSS for electric utility load research.
Comput. Oper. Res., 1989


  Loading...