Now showing items 1-5 of 5

    • On using an improved Benders method for cell suppression 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2017)
      Conference report
      Open Access
      The cell suppression problem (CSP) is one of the most widely applied methods for tabular data protection. Given a set of primary cells to be protected, CSP aims at finding a set of secondary cells to be additionally removed ...
    • Perspective reformulations of the CTA problem with L_2 distances 

      Castro Pérez, Jordi; Frangioni, Antonio; Gentile, Claudio (2014)
      Research report
      Open Access
      Any institution that disseminates data in aggregated form h as the duty to ensure that individual confidential information is not disclosed, either by not releasing data or by perturbing the released data, while maintaining ...
    • Stabilized Benders methods for large-scale combinatorial optimization, with application to data privacy 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2020-07)
      Article
      Open Access
      The Cell Suppression Problem (CSP) is a very large Mixed-IntegerLinear Problem arising in statistical disclosure control. However, CSPhas the typical structure that allows application of the Benders de-composition, which ...
    • Stabilized Benders methods for large-scale combinatorial optimization, with appllication to data privacy 

      Baena, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (2017-10-24)
      Research report
      Open Access
      The Cell Suppression Problem (CSP) is a challenging Mixed-Integer Linear Problem arising in statistical tabular data protection. Medium sized instances of CSP involve thousands of binary variables and million of continuous ...
    • Using a stabilized Benders algorithm for cell suppression 

      Baena Mirabete, Daniel; Castro Pérez, Jordi; Frangioni, Antonio (John Wiley & sons, 2019)
      Conference report
      Restricted access - publisher's policy
      The cell suppression problem (CSP) is one of the most widely applied post-tabular protection methods for tabular data. Given a set of sensitive cells to be protected, its aim is to find set of additional cells whose removal ...