-
3
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD 2000, pages 439-450, 2000.
-
(2000)
SIGMOD 2000
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In KDEX'99, pages 45-52, 1999.
-
(1999)
KDEX'99
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.S.5
-
5
-
-
27144456207
-
Generating traffic data
-
T. Brinkhoff. Generating traffic data. IEEE Data Eng. Bull., 26(2):19-25, 2003.
-
(2003)
IEEE Data Eng. Bull
, vol.26
, Issue.2
, pp. 19-25
-
-
Brinkhoff, T.1
-
6
-
-
0003504808
-
Security and privacy implications of data mining
-
Feb
-
C. Clifton and D. Marks. Security and privacy implications of data mining. In SIGMOD'96, pages 15-19, Feb. 1996.
-
(1996)
SIGMOD'96
, pp. 15-19
-
-
Clifton, C.1
Marks, D.2
-
7
-
-
84947271833
-
Hiding association rules by using confidence and support
-
E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino. Hiding association rules by using confidence and support. In Proceedings of the 4th International Workshop on Information Hiding, pages 369-383, 2001.
-
(2001)
Proceedings of the 4th International Workshop on Information Hiding
, pp. 369-383
-
-
Dasseni, E.1
Verykios, V.S.2
Elmagarmid, A.K.3
Bertino, E.4
-
8
-
-
0032108018
-
Finding the k shortest paths
-
D. Eppstein. Finding the k shortest paths. SIAM J. Computing, 28(2):652-673, 1997.
-
(1997)
SIAM J. Computing
, vol.28
, Issue.2
, pp. 652-673
-
-
Eppstein, D.1
-
9
-
-
33745476229
-
Efficient mining of temporally annotated sequences
-
Bethesda, MD, USA
-
F. Giannotti, M. Nanni, and D. Pedreschi. Efficient mining of temporally annotated sequences. In Proceedings of the Sixth SIAM International Conference on Data Mining, April 20-22, 2006, Bethesda, MD, USA.
-
Proceedings of the Sixth SIAM International Conference on Data Mining, April 20-22, 2006
-
-
Giannotti, F.1
Nanni, M.2
Pedreschi, D.3
-
10
-
-
18744393736
-
Hiding sensitive patterns in association rules mining
-
G. Lee, C.-Y. Chang, and A. L. P. Chen. Hiding sensitive patterns in association rules mining. In COMPSAC 2004, pages 424-429, 2004.
-
(2004)
COMPSAC 2004
, pp. 424-429
-
-
Lee, G.1
Chang, C.-Y.2
Chen, A.L.P.3
-
11
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research, 16(3):256-270, 2005.
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
12
-
-
0040871512
-
Knowledge discovery as a threat to database security
-
G. Piatetsky-Shapiro and W. J. Frawley, editors, AAAI/MIT Press
-
D. E. O'Leary. Knowledge discovery as a threat to database security. In G. Piatetsky-Shapiro and W. J. Frawley, editors, Knowledge Discovery in Databases, pages 507-516. AAAI/MIT Press, 1991.
-
(1991)
Knowledge Discovery in Databases
, pp. 507-516
-
-
O'Leary, D.E.1
-
13
-
-
49549095928
-
Protecting sensitive knowledge by data sanitization
-
S. R. M. Oliveira and O. R. Zaïane. Protecting sensitive knowledge by data sanitization. In ICDM 2003, pages 211-218, 2003.
-
(2003)
ICDM 2003
, pp. 211-218
-
-
Oliveira, S.R.M.1
Zaïane, O.R.2
-
15
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. ACM SIGMOD Record, 30(4):45-54, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
17
-
-
34548591826
-
A border-based approach for hiding sensitive frequent itemsets
-
X. Sun and P. S. Yu. A border-based approach for hiding sensitive frequent itemsets. In ICDM 2005, pages 426-433, 2005.
-
(2005)
ICDM 2005
, pp. 426-433
-
-
Sun, X.1
Yu, P.S.2
-
18
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1):50-57, 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
19
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE Transactions on Knowledge and Data Engineering, 16(4):434-447, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Emagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|