메뉴 건너뛰기




Volumn 65, Issue 1, 2008, Pages 40-56

Privacy-preserving imputation of missing data

Author keywords

Data cleaning; Data imputation; Privacy preserving protocols

Indexed keywords

ASSOCIATION RULES; DATA PRIVACY; DECISION TREES; INFORMATION DISSEMINATION; LEARNING ALGORITHMS;

EID: 39749149272     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.datak.2007.06.013     Document Type: Article
Times cited : (33)

References (31)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, in: ACM SIGMOD, May 2000, pp. 439-450.
    • R. Agrawal, R. Srikant, Privacy-preserving data mining, in: ACM SIGMOD, May 2000, pp. 439-450.
  • 2
    • 0242498488 scopus 로고    scopus 로고
    • An analysis of four missing data treatment methods for supervised learning
    • Batista G.E.A.P.A., and Monard M.C. An analysis of four missing data treatment methods for supervised learning. Applied Artificial Intelligence 17 5 (2003) 519-533
    • (2003) Applied Artificial Intelligence , vol.17 , Issue.5 , pp. 519-533
    • Batista, G.E.A.P.A.1    Monard, M.C.2
  • 5
    • 0041611508 scopus 로고    scopus 로고
    • Nearest neighborhood imputation for survey data
    • Chen J., and Shao J. Nearest neighborhood imputation for survey data. Journal of Official Statistics 16 2 (2000) 113-131
    • (2000) Journal of Official Statistics , vol.16 , Issue.2 , pp. 113-131
    • Chen, J.1    Shao, J.2
  • 6
    • 34249966007 scopus 로고
    • The CN2 induction algorithm
    • Clark P., and Niblett T. The CN2 induction algorithm. Machine Learning 3 4 (1989) 261-283
    • (1989) Machine Learning , vol.3 , Issue.4 , pp. 261-283
    • Clark, P.1    Niblett, T.2
  • 7
    • 39749164764 scopus 로고    scopus 로고
    • L. Coppola, M. Di Zio, O. Luzi, A. Ponti, M. Scanu, Bayesian networks for imputation in official statistics: a case study, in: DataClean Conference, 2000, pp. 30-31.
    • L. Coppola, M. Di Zio, O. Luzi, A. Ponti, M. Scanu, Bayesian networks for imputation in official statistics: a case study, in: DataClean Conference, 2000, pp. 30-31.
  • 8
    • 39749112808 scopus 로고    scopus 로고
    • I. Davidson, S.S. Ravi, Distributed pre-processing of data on networks of berkeley motes using non-parametric EM, in: Proceedings of SIAM SDM Workshop on Data Mining in Sensor Networks, 2005, pp. 17-27.
    • I. Davidson, S.S. Ravi, Distributed pre-processing of data on networks of berkeley motes using non-parametric EM, in: Proceedings of SIAM SDM Workshop on Data Mining in Sensor Networks, 2005, pp. 17-27.
  • 9
    • 2942529194 scopus 로고    scopus 로고
    • W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: Proceedings of the Fourth SIAM International Conference on Data Mining, 2004, pp. 222-233.
    • W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: Proceedings of the Fourth SIAM International Conference on Data Mining, 2004, pp. 222-233.
  • 10
    • 39749189737 scopus 로고    scopus 로고
    • A. Farhangfar, L. Kurgan, W. Pedrycz, Experimental analysis of methods for handling missing values in databases, in: Intelligent Computing: Theory and Applications II, 2004.
    • A. Farhangfar, L. Kurgan, W. Pedrycz, Experimental analysis of methods for handling missing values in databases, in: Intelligent Computing: Theory and Applications II, 2004.
  • 12
    • 0030362553 scopus 로고    scopus 로고
    • J.H. Friedman, R. Kohavi, Y. Yun, Lazy decision trees, in: Proceedings of 13th AAAI and 8th IAAI, 1996, pp. 717-724.
    • J.H. Friedman, R. Kohavi, Y. Yun, Lazy decision trees, in: Proceedings of 13th AAAI and 8th IAAI, 1996, pp. 717-724.
  • 13
    • 39749169989 scopus 로고    scopus 로고
    • B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen, On secure scalar product computation for privacy-preserving data mining, in: 7th ICISC, 2004.
    • B. Goethals, S. Laur, H. Lipmaa, T. Mielikainen, On secure scalar product computation for privacy-preserving data mining, in: 7th ICISC, 2004.
  • 15
    • 39749166617 scopus 로고    scopus 로고
    • M. Halatchev and L. Gruenwald, Estimating missing values in related sensor data streams, in: Proceedings of the Eleventh International Conference on Management of Data, 2005, pp. 83-94.
    • M. Halatchev and L. Gruenwald, Estimating missing values in related sensor data streams, in: Proceedings of the Eleventh International Conference on Management of Data, 2005, pp. 83-94.
  • 16
    • 39749131934 scopus 로고    scopus 로고
    • M. Hu, S.M. Salvucci, M.P. Cohen, Evaluation of some popular imputation algorithms, in: The Survey Research Methods Section of the ASA, 1998, pp. 308-313.
    • M. Hu, S.M. Salvucci, M.P. Cohen, Evaluation of some popular imputation algorithms, in: The Survey Research Methods Section of the ASA, 1998, pp. 308-313.
  • 17
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfer efficiently
    • Advances in Cryptology - CRYPTO '03: Proceedings of the 23rd Annual International Cryptology Conference, Springer-Verlag
    • Ishai Y., Kilian J., Nissim K., and Petrank E. Extending oblivious transfer efficiently. Advances in Cryptology - CRYPTO '03: Proceedings of the 23rd Annual International Cryptology Conference. Lecture Notes in Computer Science vol. 2729 (2003), Springer-Verlag 145-161
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 18
    • 33745439412 scopus 로고    scopus 로고
    • G. Jagannathan, K. Pillaipakkamnatt, R. Wright, A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of the 6th SIAM International Conference on Data Mining, 2006, pp. 492-496.
    • G. Jagannathan, K. Pillaipakkamnatt, R. Wright, A new privacy-preserving distributed k-clustering algorithm, in: Proceedings of the 6th SIAM International Conference on Data Mining, 2006, pp. 492-496.
  • 19
    • 41849100844 scopus 로고    scopus 로고
    • G. Jagannathan, R.N. Wright, Privacy-preserving data imputation, in: Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2006, pp. 535-540.
    • G. Jagannathan, R.N. Wright, Privacy-preserving data imputation, in: Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2006, pp. 535-540.
  • 20
    • 39749174654 scopus 로고    scopus 로고
    • M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: IEEE Workshop on Privacy-Preserving Data Mining, 2003.
    • M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: IEEE Workshop on Privacy-Preserving Data Mining, 2003.
  • 21
    • 0033225727 scopus 로고    scopus 로고
    • Imputation of missing data in industrial databases
    • Lakshminarayan K., Harp S.A., and Samad T. Imputation of missing data in industrial databases. Applied Intelligence 11 3 (1999) 259-275
    • (1999) Applied Intelligence , vol.11 , Issue.3 , pp. 259-275
    • Lakshminarayan, K.1    Harp, S.A.2    Samad, T.3
  • 23
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 25
    • 0034819509 scopus 로고    scopus 로고
    • M. Naor, K. Nissim, Communication preserving protocols for secure function evaluation, in: STOC, 2001, pp. 590-599.
    • M. Naor, K. Nissim, Communication preserving protocols for secure function evaluation, in: STOC, 2001, pp. 590-599.
  • 26
    • 0032669864 scopus 로고    scopus 로고
    • M. Naor, B. Pinkas, Oblivious transfer and polynomial evaluation, in: 31st STOC, 1999, pp. 245-254.
    • M. Naor, B. Pinkas, Oblivious transfer and polynomial evaluation, in: 31st STOC, 1999, pp. 245-254.
  • 27
    • 64049119146 scopus 로고    scopus 로고
    • M. Naor, B. Pinkas, Efficient oblivious transfer protocols, in: 12th SODA, 2001, pp. 448-457.
    • M. Naor, B. Pinkas, Efficient oblivious transfer protocols, in: 12th SODA, 2001, pp. 448-457.
  • 28
    • 33744584654 scopus 로고
    • Induction of decision trees
    • Quinlan J.R. Induction of decision trees. Machine Learning 1 1 (1986) 81-106
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1
  • 30
    • 39749163732 scopus 로고    scopus 로고
    • W. Sarle, Prediction with missing inputs, in: Proceedings of the Fourth Joint Conference on Information Sciences, 1998, pp. 399-402.
    • W. Sarle, Prediction with missing inputs, in: Proceedings of the Fourth Joint Conference on Information Sciences, 1998, pp. 399-402.
  • 31
    • 0022882770 scopus 로고    scopus 로고
    • A.C.-C. Yao, How to generate and exchange secrets, in: 27th FOCS, 1986, pp. 162-167.
    • A.C.-C. Yao, How to generate and exchange secrets, in: 27th FOCS, 1986, pp. 162-167.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.