-
1
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Adam, N. R., J. C. Wortmann. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surveys 21(4) 515-556.
-
(1989)
ACM Comput. Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
4
-
-
0003802343
-
-
Wadsworth, Belmont, CA
-
Breiman, L., J. H. Friedman, R. A. Olshen, C. J. Stone. 1984. Classification and Regression Trees. Wadsworth, Belmont, CA.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
5
-
-
0000082189
-
Suppression methodology and statistical disclosure control
-
Cox, L. H. 1980. Suppression methodology and statistical disclosure control. J. Amer. Statist. Assoc. 75(370) 377-385.
-
(1980)
J. Amer. Statist. Assoc
, vol.75
, Issue.370
, pp. 377-385
-
-
Cox, L.H.1
-
6
-
-
0011702229
-
Data swapping: A technique for disclosure control
-
Dalenius, T., S. P. Reiss. 1982. Data swapping: A technique for disclosure control. J. Statist. Planning Inference 6(1) 73-85.
-
(1982)
J. Statist. Planning Inference
, vol.6
, Issue.1
, pp. 73-85
-
-
Dalenius, T.1
Reiss, S.P.2
-
7
-
-
0020779363
-
Inference control for statistical databases
-
Denning, D. E., J. Schlörer. 1983. Inference control for statistical databases. Computer 16(7) 69-82.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlörer, J.2
-
8
-
-
0024374781
-
International application of a new probability algorithm for the diagnosis of coronary artery disease
-
Detrano, R., A. Janosi, W. Steinbrunn, M. Pfisterer, J. Schmid, S. Sandhu, K. Guppy, S. Lee, V. Froelicher. 1989. International application of a new probability algorithm for the diagnosis of coronary artery disease. Amer. J. Cardiology 64 304-310.
-
(1989)
Amer. J. Cardiology
, vol.64
, pp. 304-310
-
-
Detrano, R.1
Janosi, A.2
Steinbrunn, W.3
Pfisterer, M.4
Schmid, J.5
Sandhu, S.6
Guppy, K.7
Lee, S.8
Froelicher, V.9
-
10
-
-
84952535404
-
The risk of disclosure for microdata
-
Duncan, G. T., D. Lambert. 1989. The risk of disclosure for microdata. J. Bus. Econom. Statist. 7(2) 201-217.
-
(1989)
J. Bus. Econom. Statist
, vol.7
, Issue.2
, pp. 201-217
-
-
Duncan, G.T.1
Lambert, D.2
-
11
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
M. Mukesh, A. M. Tjoa, eds, Springer, Berlin
-
Estivill-Castro, V., L. Brankovic. 1999. Data swapping: Balancing privacy against precision in mining for logic rules. M. Mukesh, A. M. Tjoa, eds. Data Warehousing and Knowledge Discovery. Springer, Berlin, 389-398.
-
(1999)
Data Warehousing and Knowledge Discovery
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
12
-
-
4344685156
-
Genetically engineered decision trees: Population diversity produces smarter trees
-
Fu, Z., B. L. Golden, S. Lele, S. Raghavan, E. A. Wasil. 2003a. Genetically engineered decision trees: Population diversity produces smarter trees. Oper. Res. 51(6) 894-907.
-
(2003)
Oper. Res
, vol.51
, Issue.6
, pp. 894-907
-
-
Fu, Z.1
Golden, B.L.2
Lele, S.3
Raghavan, S.4
Wasil, E.A.5
-
13
-
-
0242453778
-
A genetic algorithm-based approach for building accurate decision trees
-
Fu, Z., B. L. Golden, S. Lele, S. Raghavan, E. A. Wasil. 2003b. A genetic algorithm-based approach for building accurate decision trees. INFORMS J. Comput. 15(1) 3-22.
-
(2003)
INFORMS J. Comput
, vol.15
, Issue.1
, pp. 3-22
-
-
Fu, Z.1
Golden, B.L.2
Lele, S.3
Raghavan, S.4
Wasil, E.A.5
-
14
-
-
33644677960
-
Diversification for better classification trees
-
Fu, Z., B. L. Golden, S. Lele, S. Raghavan, E. A. Wasil. 2006. Diversification for better classification trees. Comput. Oper. Res. 33(11) 3185-3202.
-
(2006)
Comput. Oper. Res
, vol.33
, Issue.11
, pp. 3185-3202
-
-
Fu, Z.1
Golden, B.L.2
Lele, S.3
Raghavan, S.4
Wasil, E.A.5
-
15
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
Fung, B. C. M., K. Wang, P. S. Yu. 2007. Anonymizing classification data for privacy preservation. IEEE Trans. Knowledge Data Engrg. 19(5) 711-725.
-
(2007)
IEEE Trans. Knowledge Data Engrg
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
17
-
-
0036602405
-
Privacy protection of binary confidential data against deterministic, stochastic, and insider threat
-
Garfinkel, R., R. Gopal, P. Goes. 2002. Privacy protection of binary confidential data against deterministic, stochastic, and insider threat. Management Sci. 48(6) 749-764.
-
(2002)
Management Sci
, vol.48
, Issue.6
, pp. 749-764
-
-
Garfinkel, R.1
Gopal, R.2
Goes, P.3
-
18
-
-
0036563104
-
Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases
-
Gopal, R., R. Garfinkel, P. Goes. 2002. Confidentiality via camouflage: The CVC approach to disclosure limitation when answering queries to databases. Oper. Res. 50(3) 501-516.
-
(2002)
Oper. Res
, vol.50
, Issue.3
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
19
-
-
0002263606
-
Privacy: Entitlement or illusion?
-
Greengard, S. 1996. Privacy: Entitlement or illusion? Personnel J. 75(5) 74-88.
-
(1996)
Personnel J
, vol.75
, Issue.5
, pp. 74-88
-
-
Greengard, S.1
-
21
-
-
73649087615
-
-
Lerman, C., J. W. Molyneaux, S. Pangemanan, Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contraceptive Prevalence Survey, I: Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
-
Lerman, C., J. W. Molyneaux, S. Pangemanan, Iswarati. 1991. The determinants of contraceptive method and service point choice. Secondary Analysis of the 1987 National Indonesia Contraceptive Prevalence Survey, Volume I: Fertility and Family Planning. East-West Population Institute, Jakarta, Indonesia.
-
-
-
-
22
-
-
33748519577
-
Privacy protection in data mining: A perturbation approach for categorical data
-
Li, X.-B., S. Sarkar. 2006a. Privacy protection in data mining: A perturbation approach for categorical data. Inform. Systems Res. 17(3) 254-270.
-
(2006)
Inform. Systems Res
, vol.17
, Issue.3
, pp. 254-270
-
-
Li, X.-B.1
Sarkar, S.2
-
23
-
-
33746873290
-
A tree-based data perturbation approach for privacy-preserving data mining
-
Li, X.-B., S. Sarkar. 2006b. A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. Knowledge Data Engrg. 18(9) 1278-1283.
-
(2006)
IEEE Trans. Knowledge Data Engrg
, vol.18
, Issue.9
, pp. 1278-1283
-
-
Li, X.-B.1
Sarkar, S.2
-
24
-
-
0041311320
-
A dynamic programming based pruning method for decision trees
-
Li, X.-B., J. Sweigart, J. Teng, J. Donohue, L. Thombs. 2002. A dynamic programming based pruning method for decision trees. INFORMS J. Comput. 13(4) 332-344.
-
(2002)
INFORMS J. Comput
, vol.13
, Issue.4
, pp. 332-344
-
-
Li, X.-B.1
Sweigart, J.2
Teng, J.3
Donohue, J.4
Thombs, L.5
-
25
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y, B. Pinkas. 2002. Privacy preserving data mining. J. Cryptology 15(3) 177-206.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu, K., H. Kargupta, J. Ryan. 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowledge Data Engrg. 18(1) 92-106.
-
(2006)
IEEE Trans. Knowledge Data Engrg
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
27
-
-
33749607006
-
-
Machanavajjhala, A., J. Gehrke, D. Kifer, M. Venkitasubramaniam. 2006. l-diversity: Privacy beyond k-anonymity. Proc. 22nd IEEE Internat. Conf. Data Engrg. (ICDE 2006). IEEE Computer Science Society, Washington, DC, 24-35.
-
Machanavajjhala, A., J. Gehrke, D. Kifer, M. Venkitasubramaniam. 2006. l-diversity: Privacy beyond k-anonymity. Proc. 22nd IEEE Internat. Conf. Data Engrg. (ICDE 2006). IEEE Computer Science Society, Washington, DC, 24-35.
-
-
-
-
28
-
-
38549090694
-
Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction
-
Nunez, M. A., R. S. Garfinkel, R. D. Gopal. 2007. Stochastic protection of confidential information in databases: A hybrid of data perturbation and query restriction. Oper. Res. 55(5) 890-908.
-
(2007)
Oper. Res
, vol.55
, Issue.5
, pp. 890-908
-
-
Nunez, M.A.1
Garfinkel, R.S.2
Gopal, R.D.3
-
29
-
-
34047166331
-
Post-pruning in decision tree induction using multiple performance measures
-
Osei-Bryson, K.-M. 2007. Post-pruning in decision tree induction using multiple performance measures. Comput. Oper Res. 34(11) 3331-3345.
-
(2007)
Comput. Oper Res
, vol.34
, Issue.11
, pp. 3331-3345
-
-
Osei-Bryson, K.-M.1
-
30
-
-
73649135739
-
-
Piatetsky-Shapiro, G., D. E. O'Leary, S. Bonorris, W. Klosgen, Y.-T. Khaw, H.-Y. Lee, W. Ziarko. 1995. Knowledge discovery in personal data vs. privacy: A mini-symposium. IEEE Expert 10(2) 46-59.
-
Piatetsky-Shapiro, G., D. E. O'Leary, S. Bonorris, W. Klosgen, Y.-T. Khaw, H.-Y. Lee, W. Ziarko. 1995. Knowledge discovery in personal data vs. privacy: A mini-symposium. IEEE Expert 10(2) 46-59.
-
-
-
-
32
-
-
0021389555
-
Practical data-swapping: The first steps
-
Reiss, S. P. 1984. Practical data-swapping: The first steps. ACM Trans. Database Systems 9(1) 20-37.
-
(1984)
ACM Trans. Database Systems
, vol.9
, Issue.1
, pp. 20-37
-
-
Reiss, S.P.1
-
33
-
-
27344440542
-
A unified mathematical programming framework for different statistical disclosure limitation methods
-
Salazar-González, J.-J. 2005. A unified mathematical programming framework for different statistical disclosure limitation methods. Oper. Res. 53(5) 819-829.
-
(2005)
Oper. Res
, vol.53
, Issue.5
, pp. 819-829
-
-
Salazar-González, J.-J.1
-
34
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati, P. 2001. Protecting respondents' identities in microdata release. IEEE Trans. Knowledge Data Engrg. 13(6) 1010-1027.
-
(2001)
IEEE Trans. Knowledge Data Engrg
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
35
-
-
73649086895
-
Data mining and homeland security: An overview
-
January 27. Retrieved July 2006
-
Seifert, J. W. 2006. Data mining and homeland security: An overview. CRS Report for Congress, January 27. Retrieved July 2006, http://www.fas.org/sgp/ crs/intel/RL31798.pdf.
-
(2006)
CRS Report for Congress
-
-
Seifert, J.W.1
-
37
-
-
16444372472
-
Impacts of user privacy preferences on personalized systems: A comparative study
-
Kluwer, Dordrecht, The Netherlands
-
Teltzrow, M., A. Kobsa. 2004. Impacts of user privacy preferences on personalized systems: A comparative study. Designing Personalized User Experiences in eCommerce. Kluwer, Dordrecht, The Netherlands, 315-332.
-
(2004)
Designing Personalized User Experiences in eCommerce
, pp. 315-332
-
-
Teltzrow, M.1
Kobsa, A.2
-
38
-
-
33746872067
-
-
Retrieved January 2006
-
Torgo, L. 1996. Housing data. Retrieved January 2006, http://www.cs.waikato.ac.nz/ml/weka/.
-
(1996)
Housing data
-
-
Torgo, L.1
-
40
-
-
73649084044
-
-
wide range of uses. Retrieved May
-
U.S. General Accounting Office. 2004. Data mining: Federal efforts cover a wide range of uses. Retrieved May 2006, http://www.gao.gov/new.items/d04548. pdf.
-
(2004)
Data mining: Federal efforts cover a
-
-
-
41
-
-
2142754478
-
Association rule hiding
-
Verykios, V. S., A. K. Elmagarmid, E. Bertino, Y. Saygin, E. Dasseni. 2004. Association rule hiding. IEEE Trans. Knowledge Data Engrg. 16(4) 434-447.
-
(2004)
IEEE Trans. Knowledge Data Engrg
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
43
-
-
73649104404
-
AOL executive quits after posting of search data
-
August 23
-
Zeller, T. 2006. AOL executive quits after posting of search data. Internat. Herald Tribune (August 23) 13.
-
(2006)
Internat. Herald Tribune
, pp. 13
-
-
Zeller, T.1
|