-
5
-
-
0029212693
-
Mining sequential patterns
-
Taipei, Taiwan, Mar. IEEE Computer Society, Washington, DC, USA
-
R. Agrawal and R. Srikant. Mining sequential patterns. In Proceedings of the 11th International Conference on Data Engineering, Taipei, Taiwan, Mar. 1995. IEEE Computer Society, Washington, DC, USA.
-
(1995)
Proceedings of the 11th International Conference on Data Engineering
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
S. Agrawal and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In ICDE, pages 193-204, 2005.
-
(2005)
ICDE
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
8
-
-
77956206776
-
Discovering frequent patterns in sensitive data
-
Pennsylvania State University, University Park, PA, USA, Apr.
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering Frequent Patterns in Sensitive Data. Technical Report NAS-TR-0129-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, Apr. 2010. http://www.cse.psu.edu/~asmith/fim/.
-
(2010)
Technical Report NAS-TR-0129-2010, Network and Security Research Center, Department of Computer Science and Engineering
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
9
-
-
57049136138
-
A learning theory approach to non-interactive database privacy
-
A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
-
(2008)
STOC
, pp. 609-618
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
10
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, LNCS, pages 1-12, 2006.
-
(2006)
ICALP, LNCS
, pp. 1-12
-
-
Dwork, C.1
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222, 2003.
-
(2003)
PODS
, pp. 211-222
-
-
Evfimievski, A.V.1
Gehrke, J.2
Srikant, R.3
-
13
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, pages 265-273, 2008.
-
(2008)
KDD
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
14
-
-
65449120405
-
Temporal pattern discovery for trends and transient effects: Its application to patient records
-
N. G.N., B. A., H. J., S. K., and E. I.R.
-
N. G.N., B. A., H. J., S. K., and E. I.R. Temporal pattern discovery for trends and transient effects: Its application to patient records. In Proceedings of the Fourteenth International Conference on Knowledge Discovery and Data Mining SIGKDD 2008, pages 963-971, 2008.
-
(2008)
Proceedings of the Fourteenth International Conference on Knowledge Discovery and Data Mining SIGKDD 2008
, pp. 963-971
-
-
-
15
-
-
77952773793
-
Privacy in search logs
-
abs/0904.0682
-
M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke. Privacy in search logs. CoRR, abs/0904.0682, 2009.
-
(2009)
CoRR
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
17
-
-
0003987805
-
-
MIT Press, Cambridge, MA, USA
-
D. Hand, H. Mannila, and P. Smyth. Principles of data mining. MIT Press, Cambridge, MA, USA, 2001.
-
(2001)
Principles of Data Mining
-
-
Hand, D.1
Mannila, H.2
Smyth, P.3
-
18
-
-
78649980717
-
-
V. Hristidis, editor Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Boca Raton, FL, USA
-
V. Hristidis, editor. Information Discovery on Electronic Health Records. Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Boca Raton, FL, USA, 2009.
-
(2009)
Information Discovery on Electronic Health Records
-
-
-
19
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, pages 171-180, 2009.
-
(2009)
WWW
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
21
-
-
0042995543
-
Dynamic generation of discrete random variates
-
Y. Matias, J. S. Vitter, and W.-C. Ni. Dynamic generation of discrete random variates. Theory Comput. Syst., 36(4):329-358, 2003.
-
(2003)
Theory Comput. Syst.
, vol.36
, Issue.4
, pp. 329-358
-
-
Matias, Y.1
Vitter, J.S.2
Ni, W.-C.3
-
22
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD Conference, pages 19-30, 2009.
-
(2009)
SIGMOD Conference
, pp. 19-30
-
-
McSherry, F.1
-
23
-
-
46749128577
-
Mechanism design via differential privacy
-
F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, 2007.
-
(2007)
FOCS
, pp. 94-103
-
-
McSherry, F.1
Talwar, K.2
-
26
-
-
12244307653
-
State of the art of graph-based data mining
-
T. Washio and H. Motoda. State of the art of graph-based data mining. SIGKDD Explorations, 5:59-68, 2003.
-
(2003)
SIGKDD Explorations
, vol.5
, pp. 59-68
-
-
Washio, T.1
Motoda, H.2
|