Accepted articles here
Volume 18 Issue 2 Volume 18 Issue 1
Volume 17 Issue 3 Volume 17 Issue 2 Volume 17 Issue 1
Volume 16 Issue 3 Volume 16 Issue 2 Volume 16 Issue 1
Volume 15 Issue 3 Volume 15 Issue 2 Volume 15 Issue 1
Volume 14 Issue 3 Volume 14 Issue 2 Volume 14 Issue 1
Volume 13 Issue 3 Volume 13 Issue 2 Volume 13 Issue 1
Volume 12 Issue 3 Volume 12 Issue 2 Volume 12 Issue 1
Volume 11 Issue 3 Volume 11 Issue 2 Volume 11 Issue 1
Volume 10 Issue 3 Volume 10 Issue 2 Volume 10 Issue 1
Volume 9 Issue 3 Volume 9 Issue 2 Volume 9 Issue 1
Volume 8 Issue 3 Volume 8 Issue 2 Volume 8 Issue 1
Volume 7 Issue 3 Volume 7 Issue 2 Volume 7 Issue 1
Volume 6 Issue 3 Volume 6 Issue 2 Volume 6 Issue 1
Volume 5 Issue 3 Volume 5 Issue 2 Volume 5 Issue 1
Volume 4 Issue 3 Volume 4 Issue 2 Volume 4 Issue 1
Volume 3 Issue 3 Volume 3 Issue 2 Volume 3 Issue 1
Volume 2 Issue 3 Volume 2 Issue 2 Volume 2 Issue 1
Volume 1 Issue 3 Volume 1 Issue 2 Volume 1 Issue 1
Comparison of Three Post-tabular Confidentiality Approaches for Survey Weighted Frequency Tables
Natalie Shlomo, Thomas Krenzke, Jianzhu Li
Transactions on Data Privacy 12:3 (2019) 145 - 168
Abstract, PDF
Statistical Properties of Sanitized Results from Differentially Private Laplace Mechanism with Univariate Bounding Constraints
Fang Liu
Transactions on Data Privacy 12:3 (2019) 169 - 195
Bayesian-based Anonymization Framework against Background Knowledge Attack in Continuous Data Publishing
Fatemeh Amiri, Nasser Yazdani, Azadeh Shakery, Shen-Shyang Ho
Transactions on Data Privacy 12:3 (2019) 197 - 225