메뉴 건너뛰기




Volumn 14, Issue 1, 2007, Pages 131-170

Privacy-preserving boosting

Author keywords

AdaBoost distributed learning; Boosting; Privacy preserving data mining; Secure multiparty computation

Indexed keywords

ALGORITHMS; CLASSIFICATION (OF INFORMATION); COMPUTATIONAL METHODS; DATA MINING; LEARNING SYSTEMS; SECURITY SYSTEMS;

EID: 33847417976     PISSN: 13845810     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10618-006-0051-9     Document Type: Article
Times cited : (45)

References (53)
  • 4
    • 0005040255 scopus 로고    scopus 로고
    • Multiple randomized classifiers: MRCL
    • Technical Report 496, Department of Statistics, University of Chicago
    • Amit Y, Blanchard G, Wilder K (2000) Multiple randomized classifiers: MRCL. Technical Report 496, Department of Statistics, University of Chicago
    • (2000)
    • Amit, Y.1    Blanchard, G.2    Wilder, K.3
  • 8
    • 26944458803 scopus 로고    scopus 로고
    • A framework for evaluating privacy preserving data mining algorithms
    • Bertino E, Fovino IN, Provenza LP (2005) A framework for evaluating privacy preserving data mining algorithms. Data Mining Knowledge Discovery 11(2):121-154
    • (2005) Data Mining Knowledge Discovery , vol.11 , Issue.2 , pp. 121-154
    • Bertino, E.1    Fovino, I.N.2    Provenza, L.P.3
  • 11
    • 84946847417 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and oblivious neural learning
    • Chang Y-C, Lu C-J (2001) Oblivious polynomial evaluation and oblivious neural learning. In: Proceedings of Asiacrypt'01, pp 369-384
    • (2001) Proceedings of Asiacrypt'01 , pp. 369-384
    • Chang, Y.-C.1    Lu, C.-J.2
  • 12
    • 0019532104 scopus 로고
    • Untracable electronic mail, return address and digital pseudonyms
    • Chaum D (1981) Untracable electronic mail, return address and digital pseudonyms. Commun ACM 24(2):84-88
    • (1981) Commun ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 14
    • 84864708144 scopus 로고
    • Multiparty computations ensuring privacy of each party's input and correctness of the result
    • Chaum D, Damgård I, van de Graaf J. (1987) Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Proceedings of Crypto'87, pp 87-119
    • (1987) Proceedings of Crypto'87 , pp. 87-119
    • Chaum, D.1    Damgård, I.2    van de Graaf, J.3
  • 18
    • 34249753618 scopus 로고
    • Support-vector networks
    • Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273-297
    • (1995) Mach Learn , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 20
    • 15744373612 scopus 로고    scopus 로고
    • Randomization in privacy preserving data mining
    • Evfimievski A (2002) Randomization in privacy preserving data mining. SIGKDD Explor 4(2): 43-48
    • (2002) SIGKDD Explor , vol.4 , Issue.2 , pp. 43-48
    • Evfimievski, A.1
  • 26
    • 0031211090 scopus 로고    scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Freund Y, Schapire RE, (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput System Sci 55:119-139
    • (1997) J Comput System Sci , vol.55 , pp. 119-139
    • Freund, Y.1    Schapire, R.E.2
  • 27
    • 0037186544 scopus 로고    scopus 로고
    • Stochastic gradient boosting
    • Friedman J (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367-378
    • (2002) Comput Stat Data Anal , vol.38 , Issue.4 , pp. 367-378
    • Friedman, J.1
  • 28
    • 84880857711 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • Furukawa J, Sako K (2001.) An efficient scheme for proving a shuffle. In: Proceedings of Crypto 2001, pp 368-387
    • (2001) Proceedings of Crypto , pp. 368-387
    • Furukawa, J.1    Sako, K.2
  • 29
    • 0003979335 scopus 로고    scopus 로고
    • basic applications. Cambridge University Press
    • Goldreich O (2004) Foundations of cryptography, volume II: basic applications. Cambridge University Press
    • (2004) Foundations of cryptography , vol.2
    • Goldreich, O.1
  • 34
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglü M, Clifton C, (2004b) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transac on Knowledge Data Engi 16(9):1026-1037
    • (2004) IEEE Transac on Knowledge Data Engi , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglü, M.1    Clifton, C.2
  • 38
    • 38049094878 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Kissner L, Song D (2005) Privacy-preserving set operations. In: Proceedings of Crypto 2005, pp 241-257
    • (2005) Proceedings of Crypto , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 39
    • 0242709384 scopus 로고    scopus 로고
    • Efficient handling of high-dimensional feature spaces by randomized classifier ensembles
    • Kolcz A, Xiaomei S, Kalita J (2002). Efficient handling of high-dimensional feature spaces by randomized classifier ensembles. In: Proceedings of SIGKDD'02, pp 307-313
    • (2002) Proceedings of SIGKDD'02 , pp. 307-313
    • Kolcz, A.1    Xiaomei, S.2    Kalita, J.3
  • 41
    • 0036495711 scopus 로고    scopus 로고
    • Boosting algorithms for parallel and distributed learning
    • Lazarevic A, Obradovic Z (2002) Boosting algorithms for parallel and distributed learning. Distrib Parallel Databases 11(2):203-229
    • (2002) Distrib Parallel Databases , vol.11 , Issue.2 , pp. 203-229
    • Lazarevic, A.1    Obradovic, Z.2
  • 42
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15:177-206
    • (2002) J Cryptol , vol.15 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 43
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Paillier P (2000) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Asiacrypt'00, pp 573-584
    • (2000) Proceedings of Asiacrypt'00 , pp. 573-584
    • Paillier, P.1
  • 44
    • 33847344479 scopus 로고    scopus 로고
    • Neff A (2001) A verifiable secret shuffle and its application to e-voting. In: ACM CCS, pp 116fb-125 Predd JB, Kulkarni SR, Poor HV (2006) Consistency in models distributed learning under communication constraints. IEEE Transac Information Theor 52(1):52-63
    • Neff A (2001) A verifiable secret shuffle and its application to e-voting. In: ACM CCS, pp 116fb-125 Predd JB, Kulkarni SR, Poor HV (2006) Consistency in models distributed learning under communication constraints. IEEE Transac Information Theor 52(1):52-63
  • 45
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan J (1986) Induction of decision trees. Mach Learn 1(1):81-106
    • (1986) Mach Learn , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.1
  • 47
    • 0033281701 scopus 로고    scopus 로고
    • Improved boosting algorithms using confidence-rated predictions
    • Schapire RE, Singer Y, (1999) Improved boosting algorithms using confidence-rated predictions. Mach Learn 37(3):297-336
    • (1999) Mach Learn , vol.37 , Issue.3 , pp. 297-336
    • Schapire, R.E.1    Singer, Y.2
  • 48
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir A (1979) How to share a secret. Communications of the ACM 22(11):612-613
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 49
    • 85150403688 scopus 로고    scopus 로고
    • Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness, Knowledge-based Syst 10(5):571-588
    • Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness, Knowledge-based Syst 10(5):571-588
  • 50
    • 0021518106 scopus 로고
    • A theory of the learnable
    • Valiant L (1984) A theory of the learnable. Communications of the ACM 27(11):1134-1142
    • (1984) Communications of the ACM , vol.27 , Issue.11 , pp. 1134-1142
    • Valiant, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.