-
1
-
-
84974555530
-
Privacy Preserving Data Mining
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36-54. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
2
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
Pinkas, B.: Cryptographic techniques for privacy-preserving data mining. ACM SIGKDD Explorations 4(2), 12-19 (2003)
-
(2003)
ACM SIGKDD Explorations
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
4
-
-
1142263341
-
Limiting privacy breaching in privacy preserving data mining
-
ACM, New York
-
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaching in privacy preserving data mining. In: ACM Symposium on Principles of Database Systems, pp. 211-222. ACM, New York (2003)
-
(2003)
ACM Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
5
-
-
85027843679
-
Privacy-preserving decision tree mining based on random substitutions
-
Freiburg, Germany June
-
Dowd, J., Xu, S., Zhang, W.: Privacy-preserving decision tree mining based on random substitutions. In: International Conference on Emerging Trends in Information and Communication Security, Freiburg, Germany (June 2006)
-
(2006)
International Conference on Emerging Trends in Information and Communication Security
-
-
Dowd, J.1
Xu, S.2
Zhang, W.3
-
7
-
-
34250661905
-
-
Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: Proceeding of the 25th ACM Symposium on Principles of Database Systems (June 2006)
-
Aggarwal, G., Feder, T., Kenthapadi, K., Khuller, S., Panigrahy, R., Thomas, D., Zhu, A.: Achieving anonymity via clustering. In: Proceeding of the 25th ACM Symposium on Principles of Database Systems (June 2006)
-
-
-
-
9
-
-
33749607006
-
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: IEEE International Conference on Data Engineering (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-diversity: Privacy beyond k-anonymity. In: IEEE International Conference on Data Engineering (2006)
-
-
-
-
10
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proc. of the IEEE Symposium on Research in Security and Privacy (1998)
-
(1998)
Proc. of the IEEE Symposium on Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
13
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: IEEE International Conference on Data Mining (2003)
-
(2003)
IEEE International Conference on Data Mining
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
15
-
-
0242625281
-
Privacy preserving mining of association rules
-
Evmievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: International Conference on Knowledge Discovery and Data Mining (2002)
-
(2002)
International Conference on Knowledge Discovery and Data Mining
-
-
Evmievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
22
-
-
33749571958
-
-
Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K. (α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In: International Conference on Knowledge Discovery and Data Mining (2006)
-
Wong, R.C.-W., Li, J., Fu, A.W.-C., Wang, K. (α, k)-anonymity: An enhanced k-anonymity model for privacy-preserving data publishing. In: International Conference on Knowledge Discovery and Data Mining (2006)
-
-
-
-
24
-
-
0026860706
-
Methods of combining multiple classifiers and their applications tohandwriting recognition
-
Xu, L., Krzyzak, A., Suen, C.Y.: Methods of combining multiple classifiers and their applications tohandwriting recognition. IEEE Transactions on Systems, Man and Cybernetics 22(3), 418-435 (1992)
-
(1992)
IEEE Transactions on Systems, Man and Cybernetics
, vol.22
, Issue.3
, pp. 418-435
-
-
Xu, L.1
Krzyzak, A.2
Suen, C.Y.3
-
25
-
-
0031121318
-
Combination of multiple classifiers using local accuracy estimates
-
Woods, K., Kegelmeyer Jr., W.P., Bowyer, K.: Combination of multiple classifiers using local accuracy estimates. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), 405-410 (1997)
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.4
, pp. 405-410
-
-
Woods, K.1
Kegelmeyer Jr., W.P.2
Bowyer, K.3
-
26
-
-
7444225924
-
Secure Association Rule Sharing
-
Dai, H, Srikant, R, Zhang, C, eds, PAKDD 2004, Springer, Heidelberg
-
Oliveira, S., Zaane, O., Saygin, Y.: Secure Association Rule Sharing. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 74-85. Springer, Heidelberg (2004)
-
(2004)
LNCS (LNAI
, vol.3056
, pp. 74-85
-
-
Oliveira, S.1
Zaane, O.2
Saygin, Y.3
-
27
-
-
34548769227
-
Blocking inference channels in frequent pattern sharing
-
Wang, Z., Wang, W., Shi, B.: Blocking inference channels in frequent pattern sharing. In: IEEE International Conference on Data Engineering, pp. 1425-1429 (2007)
-
(2007)
IEEE International Conference on Data Engineering
, pp. 1425-1429
-
-
Wang, Z.1
Wang, W.2
Shi, B.3
|