메뉴 건너뛰기




Volumn 17, Issue 2, 2008, Pages 217-240

Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining

Author keywords

Disclosure analysis; Error bound analysis; Privacy preserving; Spectral filtering

Indexed keywords

ADDITIVE NOISE; ADDITIVES; ERROR ANALYSIS; PERTURBATION TECHNIQUES; PRIVACY BY DESIGN;

EID: 56749173528     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-008-0123-9     Document Type: Article
Times cited : (11)

References (23)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases
    • Adam NR, Wortman JC (1989) Security-control methods for statistical databases. ACM Comput Surv 21(4): 515-556
    • (1989) ACM Comput Surv , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Wortman, J.C.2
  • 5
    • 36948999941 scopus 로고    scopus 로고
    • University of California, School of Information and Computer Science, Irvine
    • Asuncion A, Newman DJ (2007) UCI machine learning repository. University of California, School of Information and Computer Science, Irvine. http://www.ics.uci.edu/~mlearn/MLRepository.html
    • (2007) UCI Machine Learning Repository
    • Asuncion, A.1    Newman, D.J.2
  • 7
    • 0035694218 scopus 로고    scopus 로고
    • Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation
    • Dobra A, Fienberg SE (2001) Bounds for cell entries in contingency tables induced by fixed marginal totals with applications to disclosure limitation. Stat J United Nations ECE 18, pp 363-371
    • (2001) Stat J United Nations ECE , vol.18 , pp. 363-371
    • Dobra, A.1    Fienberg, S.E.2
  • 8
    • 15744373612 scopus 로고    scopus 로고
    • Randomization in privacy preserving data mining
    • Evfimievski A (2002) Randomization in privacy preserving data mining. SIGKDD Explor 4(2): 43-48
    • (2002) SIGKDD Explor , vol.4 , Issue.2 , pp. 43-48
    • Evfimievski, A.1
  • 18
    • 23844515436 scopus 로고    scopus 로고
    • Random-data perturbation techniques and privacy-preserving data mining
    • Kargupta H, Datta S, Wang Q, Sivakumar K (2005) Random-data perturbation techniques and privacy-preserving data mining. Knowl Inf Syst 7(4): 387-414
    • (2005) Knowl Inf Syst , vol.7 , Issue.4 , pp. 387-414
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 20
    • 31344447750 scopus 로고    scopus 로고
    • Random projection based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu K, Kargupta H, Ryan J (2006) Random projection based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans Knowl Data Eng 18(1): 92-106
    • IEEE Trans Knowl Data Eng , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 23
    • 34147125465 scopus 로고    scopus 로고
    • Handicapping attacker's confidence: An alternative to k-anonymization
    • Wang K, Fung BCM, Yu PS (2007) Handicapping attacker's confidence: An alternative to k-anonymization. Knowl Inf Syst 11(3): 345-368
    • (2007) Knowl Inf Syst , vol.11 , Issue.3 , pp. 345-368
    • Wang, K.1    Fung, B.C.M.2    Yu, P.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.