-
1
-
-
33845442788
-
A wavelet-based approach to preserve privacy for classification mining
-
S. Bapna and A. Gangopadhyay, A wavelet-based approach to preserve privacy for classification mining, Decision Sciences Journal, 37(4):623-642, 2006.
-
(2006)
Decision Sciences Journal
, vol.37
, Issue.4
, pp. 623-642
-
-
Bapna, S.1
Gangopadhyay, A.2
-
2
-
-
0004116989
-
-
1st ed, MIT Press
-
T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms, 1st ed., MIT Press, 1990.
-
(1990)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
3
-
-
15744373612
-
Randomization in privacy preserving data mining
-
A. Evfimievski, Randomization in privacy preserving data mining, ACM SIGKDD Explorations Newsletter, 4(2):43-48, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 43-48
-
-
Evfimievski, A.1
-
5
-
-
85082472975
-
A semi-visible college: Structural effects on a social networks group
-
Henderson, M.M, and McNaughton, M.J, eds, Boulder, CO: Westview Press, pp
-
L. C. Freeman and S. C. Freeman, A semi-visible college: structural effects on a social networks group, Henderson, M.M., and McNaughton, M.J. (eds.) Electronic Communication: Technology and Impacts Boulder, CO: Westview Press, pp. 77-85, 1980.
-
(1980)
Electronic Communication: Technology and Impacts
, pp. 77-85
-
-
Freeman, L.C.1
Freeman, S.C.2
-
6
-
-
41849128290
-
-
University of Massachusetts, Amherst, MA, Tech. Rep. 07-19
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava, Anonymizing social networks, University of Massachusetts, Amherst, MA, Tech. Rep. 07-19, 2007.
-
(2007)
Anonymizing social networks
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
7
-
-
11544373391
-
The Japanese corporate network transferred to North America: Implications for North American firms
-
A. Inkpen, The Japanese corporate network transferred to North America: implications for North American firms, The International Executive, 36(4): 411-433, 1994.
-
(1994)
The International Executive
, vol.36
, Issue.4
, pp. 411-433
-
-
Inkpen, A.1
-
8
-
-
62449131550
-
Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving
-
Pisa, Italy, Dec
-
L. Liu, J. Wang, and J. Zhang, Wavelet-based data perturbation for simultaneous privacy-preserving and statistics-preserving, in Proceedings of the 2008 IEEE International Conference on Data Mining Workshops, pp. 27-35, Pisa, Italy, Dec 2008.
-
(2008)
Proceedings of the 2008 IEEE International Conference on Data Mining Workshops
, pp. 27-35
-
-
Liu, L.1
Wang, J.2
Zhang, J.3
-
9
-
-
36048948044
-
A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
-
S. Mukherjee, Z. Chen, and A. Gangopadhyay, A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms, The VLDB Journal, 15(4):293-315, 2006.
-
(2006)
The VLDB Journal
, vol.15
, Issue.4
, pp. 293-315
-
-
Mukherjee, S.1
Chen, Z.2
Gangopadhyay, A.3
-
10
-
-
0033207750
-
A general additive data perturbation method for database security
-
K. Muralidhar, R. Parsa, and R. Sarathy, A general additive data perturbation method for database security, Management Science, 45(10): 1399-1415, 1999.
-
(1999)
Management Science
, vol.45
, Issue.10
, pp. 1399-1415
-
-
Muralidhar, K.1
Parsa, R.2
Sarathy, R.3
-
11
-
-
0037424991
-
Disease evolution on networks: The role of contact structure
-
J. M. Read and M. J. Keeling, Disease evolution on networks: the role of contact structure, Proc. R. Soc. Lond. B, 270: 699-708, 2003.
-
(2003)
Proc. R. Soc. Lond. B
, vol.270
, pp. 699-708
-
-
Read, J.M.1
Keeling, M.J.2
-
14
-
-
0344024833
-
Guaranteeing anonymity when sharing medical data, the DataFly system
-
L. Sweeney, Guaranteeing anonymity when sharing medical data, the DataFly system, Journal of the American Medical Informatics Association, Suppl. S, pp. 51-55, 1997.
-
(1997)
Journal of the American Medical Informatics Association
, Issue.SUPPL. S
, pp. 51-55
-
-
Sweeney, L.1
-
15
-
-
44649113555
-
Social network extraction of academic researchers
-
Omaha, NE, Oct
-
J. Tang, D. Zhang, and L. Yao, Social network extraction of academic researchers, in Proceedings of 2007 IEEE International Conference on Data Mining (ICDM 2007), Omaha, NE, Oct, 2007.
-
(2007)
Proceedings of 2007 IEEE International Conference on Data Mining (ICDM
-
-
Tang, J.1
Zhang, D.2
Yao, L.3
-
16
-
-
24944561624
-
Data distortion for privacy protection in a terrorist analysis system
-
Atlanta, GA, pp
-
S. Xu, J. Zhang, D. Han, and J. Wang, Data distortion for privacy protection in a terrorist analysis system, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, pp. 459-464, 2005.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics
, pp. 459-464
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
-
17
-
-
33749339031
-
Singular value decomposition based data distortion strategy for privacy protection
-
S. Xu, J. Zhang, D. Han, and J. Wang, Singular value decomposition based data distortion strategy for privacy protection, Knowledge and Information Systems, 10(3):383-397, 2006.
-
(2006)
Knowledge and Information Systems
, vol.10
, Issue.3
, pp. 383-397
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
-
18
-
-
1542387065
-
The role of the internet in business-to-business network transformations: A novel case and theoretical analysis
-
L. W. Young and R. B. Johnston, The role of the internet in business-to-business network transformations: a novel case and theoretical analysis, Information Systems and E-Business Management, 1(1): 73-91, 2003.
-
(2003)
Information Systems and E-Business Management
, vol.1
, Issue.1
, pp. 73-91
-
-
Young, L.W.1
Johnston, R.B.2
-
19
-
-
41849118008
-
Preserving the privacy of sensitive relationships in graph data
-
San Jose, California, pp, Aug
-
E. Zheleva and L. Getoor, Preserving the privacy of sensitive relationships in graph data, in Proceedings of the 1st ACM SIGKDD International Workshop on Privacy, Security, and Trusting KDD, San Jose, California, pp. 153-171, Aug 2007.
-
(2007)
Proceedings of the 1st ACM SIGKDD International Workshop on Privacy, Security, and Trusting KDD
, pp. 153-171
-
-
Zheleva, E.1
Getoor, L.2
-
20
-
-
52649120205
-
-
Proceedings of the 24th International Conference on Data Engineering ICDE'08, Cancun, Mexico, pp, April
-
B. Zhou and J. Pei, Preserving privacy in social networks against neighborhood attacks, in Proceedings of the 24th International Conference on Data Engineering (ICDE'08), Cancun, Mexico, pp. 506-515, April 2008.
-
(2008)
Preserving privacy in social networks against neighborhood attacks
, pp. 506-515
-
-
Zhou, B.1
Pei, J.2
|