메뉴 건너뛰기




Volumn 29, Issue 8, 2010, Pages 875-890

Classifying data from protected statistical datasets

Author keywords

Classification methods; Disclosure risk; Information loss; Statistical disclosure control; WEKA experiments

Indexed keywords

CLASSIFICATION METHODS; DISCLOSURE RISK; INFORMATION LOSS; STATISTICAL DISCLOSURE CONTROL; WEKA EXPERIMENTS;

EID: 78449301618     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.05.005     Document Type: Article
Times cited : (36)

References (44)
  • 1
    • 63449119775 scopus 로고    scopus 로고
    • Privacy-Preserving data mining: Models and algorithms
    • C.C. Aggarwal, P.S. Yu, Springer
    • C.C. Aggarwal, P.S. Yu, Privacy-Preserving data mining: models and algorithms Advances in database Systems vol. 34 2008 Springer
    • (2008) Advances in Database Systems , vol.34
  • 5
    • 0347432367 scopus 로고    scopus 로고
    • Information preserving statistical obfuscation
    • J. Burridge Information preserving statistical obfuscation Statistics and Computing 13 2003 321 327
    • (2003) Statistics and Computing , vol.13 , pp. 321-327
    • Burridge, J.1
  • 14
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of the simple Bayesian classifier under zero-one loss
    • P. Domingos, and M. Pazzani On the optimality of the simple Bayesian classifier under zero-one loss Machine Learning 29 2 1997 103 130
    • (1997) Machine Learning , vol.29 , Issue.2 , pp. 103-130
    • Domingos, P.1    Pazzani, M.2
  • 19
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • Kim J. A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the ASA section on survey research methodology; 1986. p. 303-308.
    • (1986) Proceedings of the ASA Section on Survey Research Methodology , pp. 303-308
    • Kim, J.1
  • 21
    • 62249168275 scopus 로고    scopus 로고
    • Data access in a cyber world: Making use of cyberinfrastructure
    • J. Lane, P. Heus, and T. Mulcahy Data access in a cyber world: making use of cyberinfrastructure Transactions on Data Privacy 1 1 2008 2 16
    • (2008) Transactions on Data Privacy , vol.1 , Issue.1 , pp. 2-16
    • Lane, J.1    Heus, P.2    Mulcahy, T.3
  • 24
    • 31344447750 scopus 로고    scopus 로고
    • Random projection based multiplicative data perturbation for privacy preserving data mining
    • K. Liu, H. Kargupta, and J. Ryan Random projection based multiplicative data perturbation for privacy preserving data mining IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 26
    • 26944480003 scopus 로고    scopus 로고
    • Probabilistic information loss measures in confidentiality protection of continuous microdata
    • J.M. Mateo-Sanz, J. Domingo-Ferrer, and F. Sebé Probabilistic information loss measures in confidentiality protection of continuous microdata Data Mining and Knowledge Discovery 11 2 2005 181 193
    • (2005) Data Mining and Knowledge Discovery , vol.11 , Issue.2 , pp. 181-193
    • Mateo-Sanz, J.M.1    Domingo-Ferrer, J.2    Sebé, F.3
  • 27
    • 77249136729 scopus 로고    scopus 로고
    • Generating sufficiency-based non-synthetic perturbed data
    • K. Muralidhar, and R. Sarathy Generating sufficiency-based non-synthetic perturbed data Transactions on Data Privacy 1 1 2008 17 33
    • (2008) Transactions on Data Privacy , vol.1 , Issue.1 , pp. 17-33
    • Muralidhar, K.1    Sarathy, R.2
  • 28
    • 0003408496 scopus 로고
    • University of California, Department of Information and Computer Science Irvine, CA
    • P. Murphy, and D. Aha UCI repository machine learning databases 1994 University of California, Department of Information and Computer Science Irvine, CA
    • (1994) UCI Repository Machine Learning Databases
    • Murphy, P.1    Aha, D.2
  • 29
    • 36048960434 scopus 로고    scopus 로고
    • Rethinking rank swapping to decrease disclosure risk
    • J. Nin, J. Herranz, and V. Torra Rethinking rank swapping to decrease disclosure risk Data and Knowledge Engineering 64 1 2008 346 364
    • (2008) Data and Knowledge Engineering , vol.64 , Issue.1 , pp. 346-364
    • Nin, J.1    Herranz, J.2    Torra, V.3
  • 31
    • 33744584654 scopus 로고
    • Induction of decision trees
    • J.R. Quinlan Induction of decision trees Machine Learning 1 1 1986 81 106
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Quinlan, J.R.1
  • 32
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI Intl. Tech. Rep.; 1998.
    • (1998) Technical Report, SRI Intl. Tech. Rep.
    • Samarati, P.1    Sweeney, L.2
  • 43
    • 24644489130 scopus 로고    scopus 로고
    • Re-identification methods for masked microdata
    • Springer, Proceedings of privacy in statistical databases
    • W. Winkler Re-identification methods for masked microdata Proceedings of privacy in statistical databases Lecture notes in computer science vol. 3050 2004 Springer 216 230
    • (2004) Lecture Notes in Computer Science , vol.3050 , pp. 216-230
    • Winkler, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.