메뉴 건너뛰기




Volumn 20, Issue 2, 2009, Pages 157-185

A distributed approach to enabling privacy-preserving model-based classifier training

Author keywords

Adaptive EM algorithm; Privacy preserving classifier training; Synthetic samples

Indexed keywords

ECONOMIC AND SOCIAL EFFECTS;

EID: 68349137913     PISSN: 02191377     EISSN: 02193116     Source Type: Journal    
DOI: 10.1007/s10115-008-0167-x     Document Type: Article
Times cited : (6)

References (50)
  • 2
    • 3142702937 scopus 로고    scopus 로고
    • Security of shared data in large systems: State of the art and research directions
    • Rosenthal A, Winslett M (2004) Security of shared data in large systems: state of the art and research directions. In: ACM SIGMOD
    • (2004) ACM SIGMOD
    • Rosenthal, A.1    Winslett, M.2
  • 3
    • 10444271317 scopus 로고    scopus 로고
    • Data mining, national security, privacy and civil liberties
    • Thuraisingham BM (2002) Data mining, national security, privacy and civil liberties. SIGKDD Explor Newsl 4(2): 1-5
    • (2002) SIGKDD Explor Newsl , vol.4 , Issue.2 , pp. 1-5
    • Thuraisingham, B.M.1
  • 5
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: VLDB, pp 720-731
    • (2004) VLDB , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 6
    • 77049105193 scopus 로고    scopus 로고
    • Privacy in database publishing
    • Deutsch A, Papakonstantinou Y (2005) Privacy in database publishing. In ICDT, pp 230-245
    • (2005) ICDT , pp. 230-245
    • Deutsch, A.1    Papakonstantinou, Y.2
  • 7
    • 0036811143 scopus 로고    scopus 로고
    • Achieving k-anonymity privacy protection using generalization and suppression
    • Sweeney L (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertainty 10(5): 571-588
    • (2002) J Uncertainty , vol.10 , Issue.5 , pp. 571-588
    • Sweeney, L.1
  • 9
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • Liew CK, Coi UJ, Liew CJ (1985) A data distortion by probability distribution. ACM Trans Database Syst 10(3): 395-411
    • (1985) ACM Trans Database Syst , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Coi, U.J.2    Liew, C.J.3
  • 10
    • 0346396080 scopus 로고    scopus 로고
    • Security of random data perturbation methods
    • Muralidhar K, Sarathy R (1999) Security of random data perturbation methods. ACM Trans Database Syst 24(4): 487-493
    • (1999) ACM Trans Database Syst , vol.24 , Issue.4 , pp. 487-493
    • Muralidhar, K.1    Sarathy, R.2
  • 11
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: ACM SIGMOD, pp 439-450
    • (2000) ACM SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 12
    • 33749557573 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • Agrawal D, Aggarwal C (2001) On the design and quantification of privacy preserving data mining algorithms. In: ACM PODS
    • (2001) ACM PODS
    • Agrawal, D.1    Aggarwal, C.2
  • 14
    • 24944474471 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • Evfimievski A, Gehrke J, Srikant R (2003) Limiting privacy breaches in privacy preserving data mining. In: ACM PODS
    • (2003) ACM PODS
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 15
    • 33749580222 scopus 로고    scopus 로고
    • Bottom-up generalization: A data mining solution to privacy protection
    • Wang K, Yu PS, Chakraborty S (2004) Bottom-up generalization: A data mining solution to privacy protection. In: IEEE ICDM
    • (2004) IEEE ICDM
    • Wang, K.1    Yu, P.S.2    Chakraborty, S.3
  • 16
    • 68349140095 scopus 로고    scopus 로고
    • Privacy sensitive bayesian network parameter learning
    • Ma D, Sivakumar K, Kargupta H (2004) privacy sensitive bayesian network parameter learning. In: IEEE ICDM
    • (2004) IEEE ICDM
    • Ma, D.1    Sivakumar, K.2    Kargupta, H.3
  • 18
  • 19
    • 0002337124 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • Goldreich O, Micali S, Wigderson A (1987) How to play any mental game - a completeness theorem for protocols with honest majority. In: STOC
    • (1987) STOC
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 21
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • Du W, Han Y, Chen S (2004) Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: SIAM Conference on Data Mining
    • (2004) SIAM Conference on Data Mining
    • Du, W.1    Han, Y.2    Chen, S.3
  • 22
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitional data
    • Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitional data. In: ACM SIGKDD
    • (2002) ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 23
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving k-means clustering over vertically partitioned data
    • Vaidya J, Clifton C (2003) Privacy-preserving k-means clustering over vertically partitioned data. In: ACM SIGKDD
    • (2003) ACM SIGKDD
    • Vaidya, J.1    Clifton, C.2
  • 24
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving bayesian network structure computation on distributed heterogeneous data
    • Wright R, Yang Z (2004) Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: ACM SIGKDD
    • (2004) ACM SIGKDD
    • Wright, R.1    Yang, Z.2
  • 25
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • Chen K, Liu L (2005) Privacy preserving data classification with rotation perturbation. In: IEEE ICDM, pp 589-592
    • (2005) IEEE ICDM , pp. 589-592
    • Chen, K.1    Liu, L.2
  • 26
    • 14244260513 scopus 로고    scopus 로고
    • Privacy preserving clustering by data transformation
    • Oliveira S, Zaiane OR (2003) Privacy preserving clustering by data transformation. In: SBBD
    • (2003) SBBD
    • Oliveira, S.1    Zaiane, O.R.2
  • 27
    • 0036190566 scopus 로고    scopus 로고
    • Practical data-oriented microaggregation for statistical disclosure control
    • Domingo-Ferrer J, Mateo-Sanz JM (2001) Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans Knowl Data Eng 14(1): 189-201
    • (2001) IEEE Trans Knowl Data Eng , vol.14 , Issue.1 , pp. 189-201
    • Domingo-Ferrer, J.1    Mateo-Sanz, J.M.2
  • 28
    • 0000432739 scopus 로고    scopus 로고
    • Disclosure limitation using perturbation and related methods for categorial data
    • Fienberg SE, Makov UE, Steele RJ (1998) Disclosure limitation using perturbation and related methods for categorial data. J Official Stat 14(4): 485-502
    • (1998) J Official Stat , vol.14 , Issue.4 , pp. 485-502
    • Fienberg, S.E.1    Makov, U.E.2    Steele, R.J.3
  • 29
    • 0346202087 scopus 로고    scopus 로고
    • Multiple imputation for statistical disclosure limitation
    • Raghunathan TJ, Reiter JP, Rubin D (2003) Multiple imputation for statistical disclosure limitation. J Official Stat 19(1): 1-16
    • (2003) J Official Stat , vol.19 , Issue.1 , pp. 1-16
    • Raghunathan, T.J.1    Reiter, J.P.2    Rubin, D.3
  • 31
    • 33745791486 scopus 로고    scopus 로고
    • Privacy-preserving distributed clustering using generative models
    • Merugu S, Ghosh J (2003) Privacy-preserving distributed clustering using generative models. In: IEEE ICDM
    • (2003) IEEE ICDM
    • Merugu, S.1    Ghosh, J.2
  • 33
    • 46749104446 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques. In: IEEE ICDM
    • (2003) IEEE ICDM
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 34
    • 29844458622 scopus 로고    scopus 로고
    • Deriving private information from randomized data
    • Huang Z, Du W, Chen B (2005) Deriving private information from randomized data. In: ACM SIGMOD
    • (2005) ACM SIGMOD
    • Huang, Z.1    Du, W.2    Chen, B.3
  • 35
    • 12244268919 scopus 로고    scopus 로고
    • Optimal randomization for privacy preserving data mining
    • Zhu Y, Liu L (2004) Optimal randomization for privacy preserving data mining. In: ACM SIGKDD, pp 761-766
    • (2004) ACM SIGKDD , pp. 761-766
    • Zhu, Y.1    Liu, L.2
  • 36
    • 35248886066 scopus 로고    scopus 로고
    • Mining multiple private databases using a knn classifier
    • Xiong L, Chitti S, Liu L (2007) Mining multiple private databases using a knn classifier. In: SAC
    • (2007) SAC
    • Xiong, L.1    Chitti, S.2    Liu, L.3
  • 37
    • 55149108163 scopus 로고    scopus 로고
    • Technical report, US Bureau of Census, Statistics Research Division technical report statistics 2003-01
    • Kim J, Winkler WE (2003) Multiplicative noise for masking continuous data. Technical report, US Bureau of Census, Statistics Research Division technical report statistics 2003-01
    • (2003) Multiplicative Noise for Masking Continuous Data
    • Kim, J.1    Winkler, W.E.2
  • 38
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative perturbation for privacy preserving distributed data mining
    • Liu K, Kargupta H, Ryan J (2006) Random projection-based multiplicative perturbation for privacy preserving distributed data mining. IEEE Trans Knowl Data Eng 18(1): 92-106
    • (2006) IEEE Trans Knowl Data Eng , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 39
    • 0033343146 scopus 로고    scopus 로고
    • Issues in stacked generalization
    • Ting K, Witten I (1999) Issues in stacked generalization. J Artif Intell Res 10: 271-289
    • (1999) J Artif Intell Res , vol.10 , pp. 271-289
    • Ting, K.1    Witten, I.2
  • 40
    • 33745794525 scopus 로고    scopus 로고
    • A novel approach for privacy-preserving video sharing
    • Fan J, Luo H, Hacid M-S, Bertino E (2005) A novel approach for privacy-preserving video sharing. In: ACM CIKM, pp 609-616
    • (2005) ACM CIKM , pp. 609-616
    • Fan, J.1    Luo, H.2    Hacid, M.-S.3    Bertino, E.4
  • 45
    • 33845435132 scopus 로고    scopus 로고
    • New approximations of dioeerential entropy for independent component analysisand projection pursuit
    • Hyvarinen A (1998) New approximations of dioeerential entropy for independent component analysisand projection pursuit. In: Annual Conference on Neural Information Processing Systems, vol 10, pp 273-279
    • (1998) Annual Conference on Neural Information Processing Systems , vol.10 , pp. 273-279
    • Hyvarinen, A.1
  • 46
    • 20744455382 scopus 로고    scopus 로고
    • Data swapping as a decision problem
    • Gomantam S, Karr AF, Sanil AP (2005) Data swapping as a decision problem. J Official Stat 13(4): 635-655
    • (2005) J Official Stat , vol.13 , Issue.4 , pp. 635-655
    • Gomantam, S.1    Karr, A.F.2    Sanil, A.P.3
  • 47
    • 0000964471 scopus 로고
    • Measures of disclosure risk and harm
    • Lamber D (1993) Measures of disclosure risk and harm. J Official Stat 9: 313-331
    • (1993) J Official Stat , vol.9 , pp. 313-331
    • Lamber, D.1
  • 48
    • 0033886806 scopus 로고    scopus 로고
    • Text classification from labeled and unlabeled documents using em
    • Nigam K, McCallum A, Thrun S, Mitchell T (2000) Text classification from labeled and unlabeled documents using em. Mach Learn 39(2-3): 103-134
    • (2000) Mach Learn , vol.39 , Issue.2-3 , pp. 103-134
    • Nigam, K.1    McCallum, A.2    Thrun, S.3    Mitchell, T.4
  • 49
    • 1942483137 scopus 로고    scopus 로고
    • Transductive inference for text classification using support vector machine
    • Joachims T (1999) Transductive inference for text classification using support vector machine. In: ICML
    • (1999) ICML
    • Joachims, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.