-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM PODS, pages 247 255, 2001.
-
(2001)
Proceedings of the 20th ACM PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
0029212693
-
Mining sequential patterns
-
Taipei, Taiwan
-
R. Agrawal and R. Srikant. Mining sequential patterns. In Eleventh ICDE'95, pages 3-14, Taipei, Taiwan, 1995.
-
(1995)
Eleventh ICDE'95
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
M.Atallah, E. Bertino. A. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In Proceedings of the 1999 IEEE KDEX. pages 45-52, 1999.
-
(1999)
Proceedings of the 1999 IEEE KDEX
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.S.5
-
6
-
-
34548547007
-
Blocking anonymity threats raised by frequent itemset mining
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Blocking anonymity threats raised by frequent itemset mining. In Proceedings of the Fifth IEEE ICDM, pages 501 504, 2005.
-
(2005)
Proceedings of the Fifth IEEE ICDM
, vol.504
, pp. 501
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
7
-
-
34547303670
-
Mining frequent, spatio-temporal sequential patterns
-
Houston, Texas. USA
-
H. Cao, N. Mumoulis, and D. W. Cheung. Mining frequent, spatio-temporal sequential patterns. In Proceedings of the 5th ICDM (2005), 27-30 November 2005, Houston, Texas. USA.
-
Proceedings of the 5th ICDM (2005), 27-30 November 2005
-
-
Cao, H.1
Mumoulis, N.2
Cheung, D.W.3
-
9
-
-
0344559513
-
Hiding association rules by using confidence and support
-
E. Dasseni, V. S. Verykios, A. K. Elinagarmid, and E. Bertino. Hiding association rules by using confidence and support. In Proceedings of the 4th International Workshop on Information Hiding, pages 360 383, 2001.
-
(2001)
Proceedings of the 4th International Workshop on Information Hiding
, pp. 360-383
-
-
Dasseni, E.1
Verykios, V.S.2
Elinagarmid, A.K.3
Bertino, E.4
-
10
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In Proceedings of the Ninth ACM KDD, pages 505-510, 2003.
-
(2003)
Proceedings of the Ninth ACM KDD
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
11
-
-
23144455292
-
Privacy preserving mining of association rules
-
A. Evfimicvski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM KDD, pages 343 364, 2002.
-
(2002)
Proceedings of the Eighth ACM KDD
, vol.364
, pp. 343
-
-
Evfimicvski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
13
-
-
33750296048
-
-
A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Proc. of PKDD '06, pages 151 162, Berlin, Germany, 2006. Springer-Verlag.
-
A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Proc. of PKDD '06, pages 151 162, Berlin, Germany, 2006. Springer-Verlag.
-
-
-
-
14
-
-
0003603813
-
-
W. H. Freeman & Co, New York, NY, USA
-
M. R. Garcy and D. S. Johnson. Computers and Intraettibility: A Guide, to the Theory of NP-Completeness. W. H. Freeman & Co., New York, NY, USA, 1070.
-
Computers and Intraettibility: A Guide, to the Theory of NP-Completeness
, pp. 1070
-
-
Garcy, M.R.1
Johnson, D.S.2
-
15
-
-
33644592520
-
Synthetic generation of cellular network positioning data
-
Bremen, Germany
-
F. Giannotti, A. Mazzoni, S. Puntoni, and C. Ronso. Synthetic generation of cellular network positioning data. In 13th ACM International Symposium on Advances in Geografic Information Systems (ACMGIS'05). Bremen, Germany, 2005.
-
(2005)
13th ACM International Symposium on Advances in Geografic Information Systems (ACMGIS'05)
-
-
Giannotti, F.1
Mazzoni, A.2
Puntoni, S.3
Ronso, C.4
-
17
-
-
18744393736
-
-
G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In 28th Annual International Computer Software and Applications Conference COMPSAC 2004, pages 424 429, 2004
-
G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In 28th Annual International Computer Software and Applications Conference (COMPSAC 2004), pages 424 429, 2004.
-
-
-
-
18
-
-
48349098646
-
Mining, indexing, and querying historical spatioteniporal data
-
N. Manioulis, H. Cao, G. Kollios. M. Hadjieleftheriou, Y. Tao, and D. W. Cheung. Mining, indexing, and querying historical spatioteniporal data. In Proceedings of the Tenth ACM KDD.
-
Proceedings of the Tenth ACM KDD
-
-
Manioulis, N.1
Cao, H.2
Kollios, G.3
Hadjieleftheriou, M.4
Tao, Y.5
Cheung, D.W.6
-
19
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research. 16(3):256 270. 2005.
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
20
-
-
0040871512
-
Knowledge discovery as a threat to database security
-
G. Piatetsky-Shapiro and W. J. Frawley, editors, AAAI/MIT Press
-
D. E. O'Leary. Knowledge discovery as a threat to database security. In G. Piatetsky-Shapiro and W. J. Frawley, editors, Knowledge Discovery in Databases, pages 507 516. AAAI/MIT Press, 1991.
-
(1991)
Knowledge Discovery in Databases
, pp. 507-516
-
-
O'Leary, D.E.1
-
24
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. ACM SIGMOD Record, 30(4):45 54, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
26
-
-
34548591826
-
A border-based approach for hiding sensitive frequent itemsets
-
X. Sun and P. S. Yu. A border-based approach for hiding sensitive frequent itemsets. In Proceedings of the Fifth IEEE ICDM, pages 426 433, 2005.
-
(2005)
Proceedings of the Fifth IEEE ICDM
, vol.433
, pp. 426
-
-
Sun, X.1
Yu, P.S.2
-
27
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1):50 57, 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
28
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4) :434 447, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Emagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|