-
1
-
-
63449119775
-
Privacy-Preserving data mining: Models and algorithms
-
C.C. Aggarwal, P.S. Yu, Springer
-
C.C. Aggarwal, P.S. Yu, Privacy-Preserving data mining: models and algorithms Advances in database Systems vol. 34 2008 Springer
-
(2008)
Advances in Database Systems
, vol.34
-
-
-
5
-
-
0347432367
-
Information preserving statistical obfuscation
-
J. Burridge Information preserving statistical obfuscation Statistics and Computing 13 2003 321 327
-
(2003)
Statistics and Computing
, vol.13
, pp. 321-327
-
-
Burridge, J.1
-
14
-
-
0031269184
-
On the optimality of the simple Bayesian classifier under zero-one loss
-
P. Domingos, and M. Pazzani On the optimality of the simple Bayesian classifier under zero-one loss Machine Learning 29 2 1997 103 130
-
(1997)
Machine Learning
, vol.29
, Issue.2
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.2
-
19
-
-
0002956175
-
A method for limiting disclosure in microdata based on random noise and transformation
-
Kim J. A method for limiting disclosure in microdata based on random noise and transformation. In: Proceedings of the ASA section on survey research methodology; 1986. p. 303-308.
-
(1986)
Proceedings of the ASA Section on Survey Research Methodology
, pp. 303-308
-
-
Kim, J.1
-
21
-
-
62249168275
-
Data access in a cyber world: Making use of cyberinfrastructure
-
J. Lane, P. Heus, and T. Mulcahy Data access in a cyber world: making use of cyberinfrastructure Transactions on Data Privacy 1 1 2008 2 16
-
(2008)
Transactions on Data Privacy
, vol.1
, Issue.1
, pp. 2-16
-
-
Lane, J.1
Heus, P.2
Mulcahy, T.3
-
24
-
-
31344447750
-
Random projection based multiplicative data perturbation for privacy preserving data mining
-
K. Liu, H. Kargupta, and J. Ryan Random projection based multiplicative data perturbation for privacy preserving data mining IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
26
-
-
26944480003
-
Probabilistic information loss measures in confidentiality protection of continuous microdata
-
J.M. Mateo-Sanz, J. Domingo-Ferrer, and F. Sebé Probabilistic information loss measures in confidentiality protection of continuous microdata Data Mining and Knowledge Discovery 11 2 2005 181 193
-
(2005)
Data Mining and Knowledge Discovery
, vol.11
, Issue.2
, pp. 181-193
-
-
Mateo-Sanz, J.M.1
Domingo-Ferrer, J.2
Sebé, F.3
-
27
-
-
77249136729
-
Generating sufficiency-based non-synthetic perturbed data
-
K. Muralidhar, and R. Sarathy Generating sufficiency-based non-synthetic perturbed data Transactions on Data Privacy 1 1 2008 17 33
-
(2008)
Transactions on Data Privacy
, vol.1
, Issue.1
, pp. 17-33
-
-
Muralidhar, K.1
Sarathy, R.2
-
28
-
-
0003408496
-
-
University of California, Department of Information and Computer Science Irvine, CA
-
P. Murphy, and D. Aha UCI repository machine learning databases 1994 University of California, Department of Information and Computer Science Irvine, CA
-
(1994)
UCI Repository Machine Learning Databases
-
-
Murphy, P.1
Aha, D.2
-
29
-
-
36048960434
-
Rethinking rank swapping to decrease disclosure risk
-
J. Nin, J. Herranz, and V. Torra Rethinking rank swapping to decrease disclosure risk Data and Knowledge Engineering 64 1 2008 346 364
-
(2008)
Data and Knowledge Engineering
, vol.64
, Issue.1
, pp. 346-364
-
-
Nin, J.1
Herranz, J.2
Torra, V.3
-
31
-
-
33744584654
-
Induction of decision trees
-
J.R. Quinlan Induction of decision trees Machine Learning 1 1 1986 81 106
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
32
-
-
0003483188
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Samarati P, Sweeney L. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, SRI Intl. Tech. Rep.; 1998.
-
(1998)
Technical Report, SRI Intl. Tech. Rep.
-
-
Samarati, P.1
Sweeney, L.2
-
43
-
-
24644489130
-
Re-identification methods for masked microdata
-
Springer, Proceedings of privacy in statistical databases
-
W. Winkler Re-identification methods for masked microdata Proceedings of privacy in statistical databases Lecture notes in computer science vol. 3050 2004 Springer 216 230
-
(2004)
Lecture Notes in Computer Science
, vol.3050
, pp. 216-230
-
-
Winkler, W.1
|