메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A tree-based approach to preserve the privacy of software engineering data and predictive models

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; ENGINEERING RESEARCH; TREES (MATHEMATICS);

EID: 77953744541     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1540438.1540443     Document Type: Conference Paper
Times cited : (1)

References (30)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Dallas, TX, May
    • R. Agrawal and R. Srikant. Privacy preserving data mining. In 2000 ACM SIGMOD, pages 439-450, Dallas, TX, May 2000.
    • (2000) 2000 ACM SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 28444449426 scopus 로고    scopus 로고
    • Data privacy through optimal k-anonymization
    • R. J. Bayardo and R. Agrawal. Data privacy through optimal k-anonymization. In ICDE, pages 217-228, 2005.
    • (2005) ICDE , pp. 217-228
    • Bayardo, R.J.1    Agrawal, R.2
  • 7
    • 77953740540 scopus 로고    scopus 로고
    • A systematic review of software fault prediction studies
    • Press Corrected Proof:-
    • C. Catal and B. Diri. A systematic review of software fault prediction studies. Expert Systems with Applications, In Press, Corrected Proof:-, 2008.
    • (2008) Expert Systems with Applications
    • Catal, C.1    Diri, B.2
  • 9
    • 0034245310 scopus 로고    scopus 로고
    • Quantitative analysis of faults and failures in a complex software system
    • N. E. Fenton and N. Ohlsson. Quantitative analysis of faults and failures in a complex software system. IEEE Trans. on Software Engineering, 26(8):797-814, 2000.
    • (2000) IEEE Trans. on Software Engineering , vol.26 , Issue.8 , pp. 797-814
    • Fenton, N.E.1    Ohlsson, N.2
  • 10
    • 28444499680 scopus 로고    scopus 로고
    • Top-down specialization for information and privacy preservation
    • B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In ICDE, pages 205-216, 2005.
    • (2005) ICDE , pp. 205-216
    • Fung, B.C.M.1    Wang, K.2    Yu, P.S.3
  • 13
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99-106, 2003.
    • (2003) ICDM , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 14
    • 0036891333 scopus 로고    scopus 로고
    • Using regression trees to classify fault-prone software modules
    • T. M. Khoshgoftaar, E. B. Allen, and J. Deng. Using regression trees to classify fault-prone software modules. IEEE Trans. on Reliability, 51(4):455-462, 2002.
    • (2002) IEEE Trans. on Reliability , vol.51 , Issue.4 , pp. 455-462
    • Khoshgoftaar, T.M.1    Allen, E.B.2    Deng, J.3
  • 16
    • 25844463667 scopus 로고    scopus 로고
    • Comparing high change modules and modules with the highest measurement values in two large-scale open-source products
    • A. G. Koru and J. Tian. Comparing high change modules and modules with the highest measurement values in two large-scale open-source products. IEEE Transactions on Software Engineering, 31(8):625-642, 2005.
    • (2005) IEEE Transactions on Software Engineering , vol.31 , Issue.8 , pp. 625-642
    • Koru, A.G.1    Tian, J.2
  • 19
    • 33746873290 scopus 로고    scopus 로고
    • A tree-based data perturbation approach for privacy-preserving data mining
    • DOI 10.1109/TKDE.2006.136, 1661517
    • X.-B. Li and S. Sarkar. A tree-based data perturbation approach for privacy-preserving data mining. IEEE Trans. on Knowl. and Data Eng., 18(9):1278-1283, 2006. (Pubitemid 44192193)
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.9 , pp. 1278-1283
    • Li, X.-B.1    Sarkar, S.2
  • 22
    • 0024123707 scopus 로고
    • Learning from examples: Generation and evaluation of decision trees for software resource analysis
    • R. W. Selby and A. A. Porter. Learning from examples: Generation and evaluation of decision trees for software resource analysis. IEEE Trans. on Software Engineering, 14(12):1743-1757, 1988.
    • (1988) IEEE Trans. on Software Engineering , vol.14 , Issue.12 , pp. 1743-1757
    • Selby, R.W.1    Porter, A.A.2
  • 29
    • 0032027010 scopus 로고    scopus 로고
    • Analyzing and improving reliability: A tree based approach
    • J. Tian and J. Palma. Analyzing and improving reliability: A tree based approach. IEEE Software, 15(2):97-104, 1998.
    • (1998) IEEE Software , vol.15 , Issue.2 , pp. 97-104
    • Tian, J.1    Palma, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.