-
1
-
-
0027621699
-
Mining associations between sets of items in massive databases
-
In: Washington, DC
-
Agrawal R, Imielinski T, Swami A (1993) Mining associations between sets of items in massive databases. In: Proceedings of the ACM SIGMOD international conference on management of data, Washington, DC, pp 207-216
-
(1993)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
3
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
Clifton C (2000) Using sample size to limit exposure to data mining. J Comput Secur 8(4):281-307
-
(2000)
J Comput Secur
, vol.8
, Issue.4
, pp. 281-307
-
-
Clifton, C.1
-
4
-
-
10044273842
-
Tools for privacy preserving data mining
-
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy preserving data mining. SIGKDD Explorat 4(2):28-34
-
(2002)
SIGKDD Explorat
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
5
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
Cox LH (1980) Suppression methodology and statistical disclosure control. J Am Stat Assoc, Theory Method Sect 75:377-385
-
(1980)
J Am Stat Assoc, Theory Method Sect
, vol.75
, pp. 377-385
-
-
Cox, L.H.1
-
6
-
-
0242625281
-
Privacy preserving mining of association rules
-
In: Edmonton, Alberta, Canada
-
Evfimievski A, Srikant R, Agrawal R, Gehrke J (2002) Privacy preserving mining of association rules. In: Proceedings of the 8th ACM SIGKDD, Edmonton, Alberta, Canada, pp 217-228
-
(2002)
Proceedings of the 8th ACM SIGKDD
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
7
-
-
12244265258
-
The inference problem: A survey
-
Farkas C, Jajodia S (2003) The inference problem: A survey. SIGKDD Explorat 4(2):6-11
-
(2003)
SIGKDD Explorat
, vol.4
, Issue.2
, pp. 6-11
-
-
Farkas, C.1
Jajodia, S.2
-
8
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
In: Tokyo, Japan
-
Fung BCM, Wang K, Yu PS (2005) Top-down specialization for information and privacy preservation. In: Proceedings of the 21st IEEE internaional conference on data engineering (ICDE'05), Tokyo, Japan, pp 205-216
-
(2005)
Proceedings of the 21st IEEE Internaional Conference on Data Engineering (ICDE'05)
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
9
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
In: Edmonton, Alberta, Canada
-
Iyengar VS (2002) Transforming data to satisfy privacy constraints. In: Proceedings of the 8th ACM SIGKDD, Edmonton, Alberta, Canada, pp 279-288
-
(2002)
Proceedings of the 8th ACM SIGKDD
, pp. 279-288
-
-
Iyengar, V.S.1
-
10
-
-
12244296735
-
When do data mining results violate privacy?
-
In: Seattle, WA, USA
-
Kantarcioglu M, Jin J, Clifton C (2004) When do data mining results violate privacy? In: Proceedings of the 10th ACM SIGKDD, Seattle, WA, USA, pp 599-604
-
(2004)
Proceedings of the 10th ACM SIGKDD
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
13
-
-
33749607006
-
l-diversity: Privacy beyond k -anonymity
-
In: Atlanta, GA, USA
-
Machanavajjhala A, Gehrke J, Kifer D (2006) l-diversity: Privacy beyond k -anonymity. In: Proceedings of the 22nd IEEE internaional conference on data engineering (ICDE'06), Atlanta, GA, USA
-
(2006)
Proceedings of the 22nd IEEE Internaional Conference on Data Engineering (ICDE'06)
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
-
14
-
-
33745834241
-
-
Department of Information and Computer Science, University of California, Irvine, CA
-
Newman DJ, Hettich, S, Blake CL, Merz CJ (1998) UCI repository of machine learning databases. Department of Information and Computer Science, University of California, Irvine, CA, http://www.ics.uci.edu/ ~mlearn/MLRepository.html
-
(1998)
UCI Repository of Machine Learning Databases
-
-
Newman, D.J.1
Hettich, S.2
Blake, C.L.3
Merz, C.J.4
-
15
-
-
0003500248
-
C4.5: Programs for machine learning
-
Morgan Kaufmann
-
Quinlan JR (1993) C4.5: Programs for machine learning. Morgan Kaufmann
-
(1993)
-
-
Quinlan, J.R.1
-
16
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression. Technical report SRI-CSL-98-04, SRI Computer Science Laboratory
-
(1998)
Technical Report SRI-CSL-98-04, SRI Computer Science Laboratory
-
-
Samarati, P.1
Sweeney, L.2
-
19
-
-
2142754478
-
Association rule hiding
-
Verykios VS, Elmagarmid AK, Bertino E, Saygin Y, Dasseni E (2004) Association rule hiding. IEEE Trans Knowledge Data Eng 16(4):434-447
-
(2004)
IEEE Trans Knowledge Data Eng
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
20
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
In: Houston, TX, USA
-
Wang K, Fung BCM, Yu PS (2005) Template-based privacy preservation in classification problems. In: Proceedings of the 5th IEEE international conference on data mining (ICDM'05), Houston, TX, USA, pp 466-473
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM'05)
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
21
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
In: Brighton, UK
-
Wang K, Yu PS, Chakraborty S (2004) Bottom-up generalization: A data mining solution to privacy protection. In: Proceedings of the 4th IEEE international conference on data mining (ICDM'04), Brighton, UK, pp 249-256
-
(2004)
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM'04)
, pp. 249-256
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
|