-
3
-
-
33847407731
-
Privacy-preserving boosting
-
Aïmeur E, Brassard G, Gambs S, Kégl B (2004) Privacy-preserving boosting. In: Proceedings of the international workshop on privacy and security issues in data mining, in conjunction with PKDD'04, pp 51-69
-
(2004)
Proceedings of the international workshop on privacy and security issues in data mining, in conjunction with PKDD'04
, pp. 51-69
-
-
Aïmeur, E.1
Brassard, G.2
Gambs, S.3
Kégl, B.4
-
4
-
-
0005040255
-
Multiple randomized classifiers: MRCL
-
Technical Report 496, Department of Statistics, University of Chicago
-
Amit Y, Blanchard G, Wilder K (2000) Multiple randomized classifiers: MRCL. Technical Report 496, Department of Statistics, University of Chicago
-
(2000)
-
-
Amit, Y.1
Blanchard, G.2
Wilder, K.3
-
5
-
-
85032400475
-
Disclosure limitations of sensitive rules
-
Atallah MJ, Bertino E, Elmagarmid AK, Ibrahim M, Verykios VS (1999) Disclosure limitations of sensitive rules. In: Proceedings of the IEEE knowledge and data engineering workshop, pp 45-52
-
(1999)
Proceedings of the IEEE knowledge and data engineering workshop
, pp. 45-52
-
-
Atallah, M.J.1
Bertino, E.2
Elmagarmid, A.K.3
Ibrahim, M.4
Verykios, V.S.5
-
11
-
-
84946847417
-
Oblivious polynomial evaluation and oblivious neural learning
-
Chang Y-C, Lu C-J (2001) Oblivious polynomial evaluation and oblivious neural learning. In: Proceedings of Asiacrypt'01, pp 369-384
-
(2001)
Proceedings of Asiacrypt'01
, pp. 369-384
-
-
Chang, Y.-C.1
Lu, C.-J.2
-
12
-
-
0019532104
-
Untracable electronic mail, return address and digital pseudonyms
-
Chaum D (1981) Untracable electronic mail, return address and digital pseudonyms. Commun ACM 24(2):84-88
-
(1981)
Commun ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
14
-
-
84864708144
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
Chaum D, Damgård I, van de Graaf J. (1987) Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Proceedings of Crypto'87, pp 87-119
-
(1987)
Proceedings of Crypto'87
, pp. 87-119
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
15
-
-
24144487020
-
Towards privacy in public databases
-
Chawla S, Dwork C, McSherry F. Smith A, Wee H (2005) Towards privacy in public databases. In: Proceedings of the 2nd theory of cryptography conference, pp 363-385
-
(2005)
Proceedings of the 2nd theory of cryptography conference
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
17
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C, Kantarcioglü M, Vaidya J, Lin X, Zhiu MY (2002) Tools for privacy preserving distributed data mining. SIGKDD Explor 4(2):28-34
-
(2002)
SIGKDD Explor
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglü, M.2
Vaidya, J.3
Lin, X.4
Zhiu, M.Y.5
-
18
-
-
34249753618
-
Support-vector networks
-
Cortes C, Vapnik V (1995) Support-vector networks. Mach Learn 20(3):273-297
-
(1995)
Mach Learn
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
20
-
-
15744373612
-
Randomization in privacy preserving data mining
-
Evfimievski A (2002) Randomization in privacy preserving data mining. SIGKDD Explor 4(2): 43-48
-
(2002)
SIGKDD Explor
, vol.4
, Issue.2
, pp. 43-48
-
-
Evfimievski, A.1
-
23
-
-
84879521412
-
Secure multiparty computation of approximations
-
Feigenbaum J, Ishai Y, Malkin T, Nissim K, Strauss M, Wright R (2001) Secure multiparty computation of approximations. In: Proceedings of the 28th international colloquium on automata, languages and programming, pp 927-938
-
(2001)
Proceedings of the 28th international colloquium on automata, languages and programming
, pp. 927-938
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
26
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund Y, Schapire RE, (1997) A decision-theoretic generalization of on-line learning and an application to boosting. J Comput System Sci 55:119-139
-
(1997)
J Comput System Sci
, vol.55
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
27
-
-
0037186544
-
Stochastic gradient boosting
-
Friedman J (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367-378
-
(2002)
Comput Stat Data Anal
, vol.38
, Issue.4
, pp. 367-378
-
-
Friedman, J.1
-
28
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
Furukawa J, Sako K (2001.) An efficient scheme for proving a shuffle. In: Proceedings of Crypto 2001, pp 368-387
-
(2001)
Proceedings of Crypto
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
29
-
-
0003979335
-
-
basic applications. Cambridge University Press
-
Goldreich O (2004) Foundations of cryptography, volume II: basic applications. Cambridge University Press
-
(2004)
Foundations of cryptography
, vol.2
-
-
Goldreich, O.1
-
34
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarcioglü M, Clifton C, (2004b) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transac on Knowledge Data Engi 16(9):1026-1037
-
(2004)
IEEE Transac on Knowledge Data Engi
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglü, M.1
Clifton, C.2
-
38
-
-
38049094878
-
Privacy-preserving set operations
-
Kissner L, Song D (2005) Privacy-preserving set operations. In: Proceedings of Crypto 2005, pp 241-257
-
(2005)
Proceedings of Crypto
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
39
-
-
0242709384
-
Efficient handling of high-dimensional feature spaces by randomized classifier ensembles
-
Kolcz A, Xiaomei S, Kalita J (2002). Efficient handling of high-dimensional feature spaces by randomized classifier ensembles. In: Proceedings of SIGKDD'02, pp 307-313
-
(2002)
Proceedings of SIGKDD'02
, pp. 307-313
-
-
Kolcz, A.1
Xiaomei, S.2
Kalita, J.3
-
41
-
-
0036495711
-
Boosting algorithms for parallel and distributed learning
-
Lazarevic A, Obradovic Z (2002) Boosting algorithms for parallel and distributed learning. Distrib Parallel Databases 11(2):203-229
-
(2002)
Distrib Parallel Databases
, vol.11
, Issue.2
, pp. 203-229
-
-
Lazarevic, A.1
Obradovic, Z.2
-
42
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15:177-206
-
(2002)
J Cryptol
, vol.15
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
43
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
Paillier P (2000) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Asiacrypt'00, pp 573-584
-
(2000)
Proceedings of Asiacrypt'00
, pp. 573-584
-
-
Paillier, P.1
-
44
-
-
33847344479
-
-
Neff A (2001) A verifiable secret shuffle and its application to e-voting. In: ACM CCS, pp 116fb-125 Predd JB, Kulkarni SR, Poor HV (2006) Consistency in models distributed learning under communication constraints. IEEE Transac Information Theor 52(1):52-63
-
Neff A (2001) A verifiable secret shuffle and its application to e-voting. In: ACM CCS, pp 116fb-125 Predd JB, Kulkarni SR, Poor HV (2006) Consistency in models distributed learning under communication constraints. IEEE Transac Information Theor 52(1):52-63
-
-
-
-
45
-
-
33744584654
-
Induction of decision trees
-
Quinlan J (1986) Induction of decision trees. Mach Learn 1(1):81-106
-
(1986)
Mach Learn
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.1
-
47
-
-
0033281701
-
Improved boosting algorithms using confidence-rated predictions
-
Schapire RE, Singer Y, (1999) Improved boosting algorithms using confidence-rated predictions. Mach Learn 37(3):297-336
-
(1999)
Mach Learn
, vol.37
, Issue.3
, pp. 297-336
-
-
Schapire, R.E.1
Singer, Y.2
-
48
-
-
0018545449
-
How to share a secret
-
Shamir A (1979) How to share a secret. Communications of the ACM 22(11):612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
49
-
-
85150403688
-
-
Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness, Knowledge-based Syst 10(5):571-588
-
Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty, Fuzziness, Knowledge-based Syst 10(5):571-588
-
-
-
-
50
-
-
0021518106
-
A theory of the learnable
-
Valiant L (1984) A theory of the learnable. Communications of the ACM 27(11):1134-1142
-
(1984)
Communications of the ACM
, vol.27
, Issue.11
, pp. 1134-1142
-
-
Valiant, L.1
-
51
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios VS, Bertino E, Fovino IN, Provenza LP, Saygin Y, Theodoridis Y (2004) State-of-the-art in privacy preserving data mining. SIGMOD Record 3(1):50-57
-
(2004)
SIGMOD Record
, vol.3
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|