메뉴 건너뛰기




Volumn , Issue , 2003, Pages 31-38

Analysis Of Privacy Preserving Random Perturbation Techniques: Further Explorations

Author keywords

Privacy; Random perturbation; Security

Indexed keywords

DATA DISTORTION; RANDOM-PERTUBATION;

EID: 1642374941     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (24)
  • 3
    • 0033354520 scopus 로고    scopus 로고
    • An algorithmic theory of learning: Robust concepts and random projection
    • New York, New York
    • R. Arriaga and S. Vempala. An algorithmic theory of learning: Robust concepts and random projection. In Proc. of the 40th Foundations of Computer Science, New York, New York, 1999.
    • (1999) Proc. of the 40th Foundations of Computer Science
    • Arriaga, R.1    Vempala, S.2
  • 8
    • 15744373612 scopus 로고    scopus 로고
    • Randomization in Privacy-Preserving Data Mining
    • A. Evfimievski. Randomization in Privacy-Preserving Data Mining. ACM SIGKDD Explorations, Volume 4, issue 2, pages 43-48, 2003.
    • (2003) ACM SIGKDD Explorations , vol.4 , Issue.2 , pp. 43-48
    • Evfimievski, A.1
  • 11
    • 0013003941 scopus 로고
    • Context vectors: General purpose approximate meaning representations self-organized from raw data
    • R. Hecht-Nielsen. Context vectors: general purpose approximate meaning representations self-organized from raw data. Computational Intelligence: Imitating Life, pages 43-56, 1994.
    • (1994) Computational Intelligence: Imitating Life , pp. 43-56
    • Hecht-Nielsen, R.1
  • 15
    • 0038794908 scopus 로고    scopus 로고
    • Random projection and privacy preserving correlation computation from distributed data
    • Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County
    • H. Kargupta, K. Liu, and J. Ryan. (2003). Random projection and privacy preserving correlation computation from distributed data. Technical Report TR-CS-03-24, Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County.
    • (2003) Technical Report , vol.TR-CS-03-24
    • Kargupta, H.1    Liu, K.2    Ryan, J.3
  • 17
    • 0012254042 scopus 로고    scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • M. K. Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social Networks, volume 13, pp. 251-274.
    • Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.K.1
  • 21
    • 1642274878 scopus 로고    scopus 로고
    • A simplified introduction to correlation and regression
    • K. L. Weldon. A simplified introduction to correlation and regression. Journal of Statistics Education, 8(3), 2000.
    • (2000) Journal of Statistics Education , vol.8 , Issue.3
    • Weldon, K.L.1
  • 23
    • 1642390337 scopus 로고    scopus 로고
    • Statstream: Statistical monitoring of thousands of data streams in real time
    • Hong Kong, China
    • Y. Zue and D. Shasha. Statstream: Statistical monitoring of thousands of data streams in real time. In Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002.
    • (2002) Proceedings of the 28th VLDB Conference
    • Zue, Y.1    Shasha, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.