-
1
-
-
3142716056
-
-
R. Agrawal, J. Kiernan, R. Srikant, Y. Xu. Order preserving encryption for numeric data, in: Proceedings of SIGMOD 2004, Paris, France, 2004, pp. 563-574.
-
-
-
-
2
-
-
34548609030
-
-
R. Agrawal, R. Srikant. Fast algorithms for mining association rules, in: Proceedings of 20th International Conference on Very Large Databases, Chile, 1994, pp. 487-499.
-
-
-
-
3
-
-
0041783510
-
-
R. Agrawal, R. Srikant. Privacy-preserving data mining, in: Proceedings of ACM SIGMOD Conference on Management of Data, ACM Press, May 2000, pp. 439-450.
-
-
-
-
4
-
-
33749576326
-
-
J. Brickell, V. Shmatikov. Efficient anonymity preserving data collection, in: Proceedings of KDD 2006, Philadelphia, PA, USA, August 2006, pp. 76-85.
-
-
-
-
5
-
-
34548639229
-
-
W. Du, Z. Zhan. Building decision tree classifier on private data, in: Proceedings of the IEEE international conference on Privacy, security and data mining, vol. 14, 2002, pp. 1-8.
-
-
-
-
6
-
-
77952334884
-
-
W. Du, Z. Zhan. Using randomized response techniques for privacy-preserving data mining, in: Proceedings of 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003, pp. 505-510.
-
-
-
-
7
-
-
24944523186
-
-
B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen. On private scalar product computation for privacy-preserving data mining, in: The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), vol. 3506 of Lecture Notes in Computer Science, 2004, pp. 104-120.
-
-
-
-
10
-
-
29844458622
-
-
Z. Huang, W. Du, B. Chen. Deriving private information from randomized data, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2005, pp. 37-48.
-
-
-
-
11
-
-
84969524054
-
-
I. Ioannidis, A. Grama. An efficient protocol for yao's millionaires' problem, in: Proceedings of 36th Hawaii International Conference on System Sciences (HICSS'03), 2003, pp. 205-210.
-
-
-
-
12
-
-
33745439412
-
-
G. Jagannathan, K. Pillaipakkaamnatt, R. Wright. A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of 2006 SIAM International Conference on Data Mining(SDM), 2006, pp. 492-496.
-
-
-
-
13
-
-
32344446366
-
-
G. Jagannathan, R. Wright. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, in: Proceedings of ACM KDD 2005, 2005, pp. 593-599.
-
-
-
-
14
-
-
34248346949
-
-
Qinglin Jiang, Douglas S. Reeves, Peng Ning. Improving robustness of pgp keyrings by conflict detection, in: Topics in Cryptology-CT-RSA 2004, 2004, pp. 194-207.
-
-
-
-
15
-
-
78449273979
-
-
W. Jiang, C. Clifton. Transforming semi-honest protocols to ensure accountability, in: The ICDM workshop on Privacy Aspects of Data Mining (PADM06), 2006, pp. 542-529.
-
-
-
-
16
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarci{dotless}oǧlu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 16 9 (2004) 1026-1037
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
17
-
-
33749540392
-
-
M. Kantarci{dotless}oǧlu, C. Clifton, Privately computing a distributed k-nn classifier, in: Proceedings of PKDD 2004, 2004, pp. 279-290.
-
-
-
-
18
-
-
34548605150
-
-
M. Kantarci{dotless}oǧlu, O. Kardes. Privacy preserving data mining in malicious model. Technical Report CS-2006-06, Stevens Institute of Technology, Department of Computer Science, 2006.
-
-
-
-
19
-
-
33749568323
-
-
K. LeFevre, D. DeWitt, R. Ramakrishnan. Workload aware anonymization, in: Proceedings of KDD 2006, Philadelphia, PA, USA, August 2006, pp. 277-286.
-
-
-
-
20
-
-
84974555530
-
-
Y. Lindell, B. Pinkas. Privacy preserving data mining, in: Proceedings of CRYPTO 2000, 2000, pp. 36-54.
-
-
-
-
21
-
-
85084163840
-
-
D. Malkhi, N. Nisan, B. Pinkas, Y. Sella. Fairplay - a secure two-party computation system, in: Proceedings of Usenix Security Symposium 2004, 2004, pp. 20-35.
-
-
-
-
22
-
-
0242709355
-
-
J. Vaidya, C. Clifton. Privacy preserving association rule mining in vertically partitioned data, in: Proceedings of 8th ACM SIGKDD International conference on Knowledge discovery and data mining, 2002, pp. 639-644.
-
-
-
-
23
-
-
12244255356
-
-
R. Wright, Z. Yang. Privacy preserving bayesian network structure computation on distributed heterogeneous data, in: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004, pp. 713-718.
-
-
-
-
24
-
-
32344451483
-
-
Z. Yang, S. Zhong, R. Wright. Anonymity preserving data collection, in: Proceedings of ACM KDD 2005, Chicago, August 2005, pp. 334-343.
-
-
-
-
25
-
-
84880121624
-
-
Z. Yang, S. Zhong, R. Wright. Privacy preserving classification of customer data without loss of accuracy, in: Proceedings of 2005 SIAM International Conference on Data Mining(SDM), California, April 2005, pp. 92-102.
-
-
-
-
26
-
-
0022882770
-
-
A. Yao. How to generate and exchange secrets, in: Proceedings of 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 162-167.
-
-
-
-
27
-
-
2442705676
-
Genescout: a data mining system for predicting vertebrate genes in genomic DNA sequences
-
Yin M.M., and Wang J.T.L. Genescout: a data mining system for predicting vertebrate genes in genomic DNA sequences. Information Sciences 163 1-3 (2004) 201-218
-
(2004)
Information Sciences
, vol.163
, Issue.1-3
, pp. 201-218
-
-
Yin, M.M.1
Wang, J.T.L.2
-
28
-
-
33646140552
-
A false negative approach to mining frequent itemsets from high speed transactional data streams
-
Yu J.X., Chong Z., Lu H., Zhang Z., and Zhou A. A false negative approach to mining frequent itemsets from high speed transactional data streams. Information Sciences 176 16 (2006) 1986-2015
-
(2006)
Information Sciences
, vol.176
, Issue.16
, pp. 1986-2015
-
-
Yu, J.X.1
Chong, Z.2
Lu, H.3
Zhang, Z.4
Zhou, A.5
-
29
-
-
19744364896
-
Fuzzy reasoning model under quotient space structure
-
Zhang L., and Zhang B. Fuzzy reasoning model under quotient space structure. Information Sciences 176 4 (2005) 353-364
-
(2005)
Information Sciences
, vol.176
, Issue.4
, pp. 353-364
-
-
Zhang, L.1
Zhang, B.2
-
30
-
-
33750333499
-
Privacy preserving algorithms for distributed mining of frequent itemsets
-
Zhong S. Privacy preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 490-503
-
-
Zhong, S.1
|