메뉴 건너뛰기




Volumn , Issue , 2010, Pages 503-512

Discovering frequent patterns in sensitive data

Author keywords

Differential privacy; Exponential mechanism; Frequent itemsets; Frequent patterns; Privacy

Indexed keywords

DIFFERENTIAL PRIVACIES; EXPONENTIAL MECHANISM; FREQUENT ITEMSETS; FREQUENT PATTERNS; PRIVACY;

EID: 77956209107     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1835804.1835869     Document Type: Conference Paper
Times cited : (236)

References (26)
  • 6
    • 28444434728 scopus 로고    scopus 로고
    • A framework for high-accuracy privacy-preserving mining
    • S. Agrawal and J. R. Haritsa. A framework for high-accuracy privacy-preserving mining. In ICDE, pages 193-204, 2005.
    • (2005) ICDE , pp. 193-204
    • Agrawal, S.1    Haritsa, J.R.2
  • 9
    • 57049136138 scopus 로고    scopus 로고
    • A learning theory approach to non-interactive database privacy
    • A. Blum, K. Ligett, and A. Roth. A learning theory approach to non-interactive database privacy. In STOC, pages 609-618, 2008.
    • (2008) STOC , pp. 609-618
    • Blum, A.1    Ligett, K.2    Roth, A.3
  • 10
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP, LNCS, pages 1-12, 2006.
    • (2006) ICALP, LNCS , pp. 1-12
    • Dwork, C.1
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 12
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. V. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS, pages 211-222, 2003.
    • (2003) PODS , pp. 211-222
    • Evfimievski, A.V.1    Gehrke, J.2    Srikant, R.3
  • 13
    • 65449162734 scopus 로고    scopus 로고
    • Composition attacks and auxiliary information in data privacy
    • S. R. Ganta, S. P. Kasiviswanathan, and A. Smith. Composition attacks and auxiliary information in data privacy. In KDD, pages 265-273, 2008.
    • (2008) KDD , pp. 265-273
    • Ganta, S.R.1    Kasiviswanathan, S.P.2    Smith, A.3
  • 14
    • 65449120405 scopus 로고    scopus 로고
    • Temporal pattern discovery for trends and transient effects: Its application to patient records
    • N. G.N., B. A., H. J., S. K., and E. I.R.
    • N. G.N., B. A., H. J., S. K., and E. I.R. Temporal pattern discovery for trends and transient effects: Its application to patient records. In Proceedings of the Fourteenth International Conference on Knowledge Discovery and Data Mining SIGKDD 2008, pages 963-971, 2008.
    • (2008) Proceedings of the Fourteenth International Conference on Knowledge Discovery and Data Mining SIGKDD 2008 , pp. 963-971
  • 18
    • 78649980717 scopus 로고    scopus 로고
    • V. Hristidis, editor Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Boca Raton, FL, USA
    • V. Hristidis, editor. Information Discovery on Electronic Health Records. Chapman & Hall/CRC Data Mining and Knowledge Discovery Series, Boca Raton, FL, USA, 2009.
    • (2009) Information Discovery on Electronic Health Records
  • 19
    • 84865663496 scopus 로고    scopus 로고
    • Releasing search queries and clicks privately
    • A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas. Releasing search queries and clicks privately. In WWW, pages 171-180, 2009.
    • (2009) WWW , pp. 171-180
    • Korolova, A.1    Kenthapadi, K.2    Mishra, N.3    Ntoulas, A.4
  • 21
    • 0042995543 scopus 로고    scopus 로고
    • Dynamic generation of discrete random variates
    • Y. Matias, J. S. Vitter, and W.-C. Ni. Dynamic generation of discrete random variates. Theory Comput. Syst., 36(4):329-358, 2003.
    • (2003) Theory Comput. Syst. , vol.36 , Issue.4 , pp. 329-358
    • Matias, Y.1    Vitter, J.S.2    Ni, W.-C.3
  • 22
    • 70849116921 scopus 로고    scopus 로고
    • Privacy integrated queries: An extensible platform for privacy-preserving data analysis
    • F. McSherry. Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In SIGMOD Conference, pages 19-30, 2009.
    • (2009) SIGMOD Conference , pp. 19-30
    • McSherry, F.1
  • 23
    • 46749128577 scopus 로고    scopus 로고
    • Mechanism design via differential privacy
    • F. McSherry and K. Talwar. Mechanism design via differential privacy. In FOCS, pages 94-103, 2007.
    • (2007) FOCS , pp. 94-103
    • McSherry, F.1    Talwar, K.2
  • 26
    • 12244307653 scopus 로고    scopus 로고
    • State of the art of graph-based data mining
    • T. Washio and H. Motoda. State of the art of graph-based data mining. SIGKDD Explorations, 5:59-68, 2003.
    • (2003) SIGKDD Explorations , vol.5 , pp. 59-68
    • Washio, T.1    Motoda, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.