-
2
-
-
49549094278
-
Negation recognition in medical narrative reports
-
L. Rokach, R. Romano, and O. Maimon, "Negation Recognition in Medical Narrative Reports," Information Retrieval, vol.11, no.6, pp. 499-538, 2008.
-
(2008)
Information Retrieval
, vol.11
, Issue.6
, pp. 499-538
-
-
Rokach, L.1
Romano, R.2
Maimon, O.3
-
3
-
-
30744457110
-
Local perspective of the impact of the HIPAA privacy rule on research
-
M.S. Wolf and C.L. Bennett, "Local Perspective of the Impact of the HIPAA Privacy Rule on Research," Cancer-Philadelphia Then Hoboken, vol.106, no.2, pp. 474-479, 2006.
-
(2006)
Cancer-Philadelphia Then Hoboken
, vol.106
, Issue.2
, pp. 474-479
-
-
Wolf, M.S.1
Bennett, C.L.2
-
5
-
-
0036811662
-
K-Anonymity: A model for protecting privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol.10, no.5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
6
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression," Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems, vol.10, no.5, pp. 571-588, 2002.
-
(2002)
Int'l J. Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
7
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Apr.
-
B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. 21st IEEE Int'l Conf. Data Eng. (ICDE '05), pp. 205-216, Apr. 2005.
-
(2005)
Proc. 21st IEEE Int'l Conf. Data Eng. (ICDE '05)
, pp. 205-216
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
8
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
K. Wang, P.S. Yu, and S. Chakraborty, "Bottom-Up Generalization: A Data Mining Solution to Privacy Protection," Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 205-216, 2004.
-
(2004)
Proc. Fourth IEEE Int'l Conf. Data Mining
, pp. 205-216
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
9
-
-
76749111107
-
Optimal k-anonymity with flexible generalization schemes through bottom-up searching
-
L. Tiancheng and I. Ninghui, "Optimal K-Anonymity with Flexible Generalization Schemes through Bottom-Up Searching," Proc. Sixth IEEE Int'l Conf. Data Mining Workshops, pp. 518-523, 2006.
-
(2006)
Proc. Sixth IEEE Int'l Conf. Data Mining Workshops
, pp. 518-523
-
-
Tiancheng, L.1
Ninghui, I.2
-
10
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
S.V. Iyengar, "Transforming Data to Satisfy Privacy Constraints," Proc. Eighth ACM SIGKDD, pp. 279-288, 2002.
-
(2002)
Proc. Eighth ACM SIGKDD
, pp. 279-288
-
-
Iyengar, S.V.1
-
11
-
-
34047165799
-
Anonymizing classification data for privacy preservation
-
May
-
B.C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data for Privacy Preservation," IEEE Trans. Knowledge and Data Eng., vol.19, no.5, pp. 711-725, May 2007.
-
(2007)
IEEE Trans. Knowledge and Data Eng.
, vol.19
, Issue.5
, pp. 711-725
-
-
Fung, B.C.M.1
Wang, K.2
Yu, P.S.3
-
12
-
-
29844444250
-
Incognito: Efficient full domain k-anonymity
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full Domain k-Anonymity," Proc. 2005 ACM SIGMOD, pp. 49-60, 2005.
-
(2005)
Proc. 2005 ACM SIGMOD
, pp. 49-60
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
13
-
-
45749151381
-
Providing k-Anonymity in data mining
-
A. Friedman, R. Wolff, and A. Schuster, "Providing k-Anonymity in Data Mining," Int'l J. Very Large Data Bases, vol.17, no.4, pp. 789-804, 2008.
-
(2008)
Int'l J. Very Large Data Bases
, vol.17
, Issue.4
, pp. 789-804
-
-
Friedman, A.1
Wolff, R.2
Schuster, A.3
-
14
-
-
0031381525
-
Wrappers for feature subset selection
-
R. Kohavi and G.H. John, "Wrappers for Feature Subset Selection," Artificial Intelligence, vol.97, nos. 1/2, pp. 273-324, 1997.
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1-2
, pp. 273-324
-
-
Kohavi, R.1
John, G.H.2
-
15
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V.S. Verykios, E. Bertino, I.N. Fovino, L.P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-the-Art in Privacy Preserving Data Mining," ACM SIGMOD Record, vol.33, no.1, pp. 50-57, 2004.
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
16
-
-
0041783510
-
Privacy preserving data mining
-
A. Agrawal and R. Srikant, "Privacy Preserving Data Mining," ACM SIGMOD Record, vol.29, no.2, pp. 439-450, 2000.
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, A.1
Srikant, R.2
-
17
-
-
12244293654
-
K-TTP: A new privacy model for large-scale distributed environments
-
B. Gilburd, A. Schuster, and R. Wolff, "k-TTP: A New Privacy Model for Large-Scale Distributed Environments," Proc. 10th ACM SIGKDD, pp. 563-568, 2004.
-
(2004)
Proc. 10th ACM SIGKDD
, pp. 563-568
-
-
Gilburd, B.1
Schuster, A.2
Wolff, R.3
-
19
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
J. Roberto, Jr. Bayardo, and A. Rakesh, "Data Privacy through Optimal k-Anonymization," Proc. Int'l Conf. Data Eng., vol.21, pp. 217-228, 2005.
-
(2005)
Proc. Int'l Conf. Data Eng.
, vol.21
, pp. 217-228
-
-
Roberto, J.1
Bayardo, Jr.2
Rakesh, A.3
-
20
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
June
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim, "Practical Privacy: The SuLQ Framework," Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles of Database Systems, pp. 128-138, June 2005.
-
(2005)
Proc. 24th ACM SIGMODSIGACT-SIGART Symp. Principles of Database Systems
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
21
-
-
24144487020
-
Toward privacy in public databases
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee, "Toward Privacy in Public Databases," Proc. Theory of Cryptography Conf., pp. 363-385, 2005.
-
(2005)
Proc. Theory of Cryptography Conf.
, pp. 363-385
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
22
-
-
33749568934
-
Template-based privacy preservation in classification problems
-
K. Wang, B.C.M. Fung, and P.S. Yu, "Template-Based Privacy Preservation in Classification Problems," Proc. Fifth IEEE Int'l Conf. Data Mining, pp. 466-473, 2005.
-
(2005)
Proc. Fifth IEEE Int'l Conf. Data Mining
, pp. 466-473
-
-
Wang, K.1
Fung, B.C.M.2
Yu, P.S.3
-
23
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
E. Bertino, B.C. Ooi, Y. Yang, and R.H. Deng, "Privacy and Ownership Preserving of Outsourced Medical Data," Proc. Int'l Conf. Data Eng., vol.21, pp. 521-532, 2005.
-
(2005)
Proc. Int'l Conf. Data Eng.
, vol.21
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
24
-
-
33746711412
-
Approximation algorithms for k-anonymity
-
G. Aggarwal, A. Feder, K. Kenthapadi, R. Motwani, R. Panigrahy, D. Thomas, and A. Zhu, "Approximation Algorithms for k-Anonymity," J. Privacy Technology, 2005.
-
(2005)
J. Privacy Technology
-
-
Aggarwal, G.1
Feder, A.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
26
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Nov./Dec.
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Trans. Knowledge and Data Eng., vol.13, no.6, pp. 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge and Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
27
-
-
33749606641
-
Mondrian multidimensional k-anonymity
-
Apr.
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Mondrian Multidimensional k-Anonymity," Proc. 22nd Int'l Conf. Data Eng., p. 25, Apr. 2006.
-
(2006)
Proc. 22nd Int'l Conf. Data Eng.
, pp. 25
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
28
-
-
33749568323
-
Workload-aware anonymization
-
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Workload-Aware Anonymization," Proc. 12th ACM SIGKDD, pp. 277-286, 2006.
-
(2006)
Proc. 12th ACM SIGKDD
, pp. 277-286
-
-
Lefevre, K.1
Dewitt, D.J.2
Ramakrishnan, R.3
-
30
-
-
41849136845
-
Privacy-preserving data mining through knowledge model sharing
-
Springer
-
P. Sharkey, H. Tian, W. Zhang, and S. Xu, "Privacy-Preserving Data Mining through Knowledge Model Sharing," Privacy, Security and Trust in KDD, pp. 97-115, Springer, 2008.
-
(2008)
Privacy, Security and Trust in KDD
, pp. 97-115
-
-
Sharkey, P.1
Tian, H.2
Zhang, W.3
Xu, S.4
-
31
-
-
0030169748
-
Towards tractable algebras for bags
-
S. Grumbach and T. Milo, "Towards Tractable Algebras for Bags," J. Computer and System Sciences, vol.52, no.3, pp. 570-588, 1996.
-
(1996)
J. Computer and System Sciences
, vol.52
, Issue.3
, pp. 570-588
-
-
Grumbach, S.1
Milo, T.2
-
32
-
-
34548748588
-
On multidimensional k-anonymity with local recoding generalization
-
Y. Du, T. Xia, Y. Tao, D. Zhang, and F. Zhu, "On Multidimensional k-Anonymity with Local Recoding Generalization," Proc. Int'l Conf. Data Eng. (ICDE), pp. 1422-1424, 2007.
-
(2007)
Proc. Int'l Conf. Data Eng. (ICDE)
, pp. 1422-1424
-
-
Du, Y.1
Xia, T.2
Tao, Y.3
Zhang, D.4
Zhu, F.5
-
33
-
-
50549096139
-
Pessimistic cost-sensitive active learning of decision trees
-
L. Rokach, L. Naamani, and A. Shmilovici, "Pessimistic Cost-Sensitive Active Learning of Decision Trees," Data Mining and Knowledge Discovery, vol.17, no.2, pp. 283-316, 2008.
-
(2008)
Data Mining and Knowledge Discovery
, vol.17
, Issue.2
, pp. 283-316
-
-
Rokach, L.1
Naamani, L.2
Shmilovici, A.3
-
35
-
-
0033570831
-
Combined 52 cv F test for comparing supervised classification learning classifiers
-
E. Alpaydin, "Combined 52 cv F Test for Comparing Supervised Classification Learning Classifiers," Neural Computation, vol.11, no.8, pp. 1885-1892, 1999.
-
(1999)
Neural Computation
, vol.11
, Issue.8
, pp. 1885-1892
-
-
Alpaydin, E.1
-
36
-
-
36948999941
-
-
School of Information and Computer Science, Univ. of California
-
A. Asuncion and D.J. Newman, "UCI Machine Learning Repository," School of Information and Computer Science, Univ. of California, http://mlearn.ics.uci.edu/MLRepository.html, 2007.
-
(2007)
UCI Machine Learning Repository
-
-
Asuncion, A.1
Newman, D.J.2
-
39
-
-
29644438050
-
Statistical comparisons of classifiers over multiple data sets
-
J. Demsar, "Statistical Comparisons of Classifiers over Multiple Data Sets," J. Machine Learning Research, vol.7, pp. 1-30, 2006. (Pubitemid 43022939)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 1-30
-
-
Demsar, J.1
-
40
-
-
38349121661
-
Genetic algorithm-based feature set partitioning for classification problems
-
L. Rokach, "Genetic Algorithm-Based Feature Set Partitioning for Classification Problems," Pattern Recognition, vol.41, no.5, pp. 1693-1717, 2008.
-
(2008)
Pattern Recognition
, vol.41
, Issue.5
, pp. 1693-1717
-
-
Rokach, L.1
|