• On using an improved Benders method for cell suppression 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2017)
      Text en actes de congrés
      Accés obert
      The cell suppression problem (CSP) is one of the most widely applied methods for tabular data protection. Given a set of primary cells to be protected, CSP aims at finding a set of secondary cells to be additionally removed ...
    • Perspective reformulations of the CTA problem with L_2 distances 

      Castro Pérez, Jordi; Frangioni, Antonio; Gentile, Claudio (2014)
      Report de recerca
      Accés obert
      Any institution that disseminates data in aggregated form h as the duty to ensure that individual confidential information is not disclosed, either by not releasing data or by perturbing the released data, while maintaining ...
    • Stabilized Benders methods for large-scale combinatorial optimization, with application to data privacy 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2020-07)
      Article
      Accés obert
      The Cell Suppression Problem (CSP) is a very large Mixed-IntegerLinear Problem arising in statistical disclosure control. However, CSPhas the typical structure that allows application of the Benders de-composition, which ...
    • Stabilized Benders methods for large-scale combinatorial optimization, with appllication to data privacy 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2017-10-24)
      Report de recerca
      Accés obert
      The Cell Suppression Problem (CSP) is a challenging Mixed-Integer Linear Problem arising in statistical tabular data protection. Medium sized instances of CSP involve thousands of binary variables and million of continuous ...
    • Using a stabilized Benders algorithm for cell suppression 

      Baena Mirabete, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (John Wiley & sons, 2019)
      Text en actes de congrés
      Accés restringit per política de l'editorial
      The cell suppression problem (CSP) is one of the most widely applied post-tabular protection methods for tabular data. Given a set of sensitive cells to be protected, its aim is to find set of additional cells whose removal ...