메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Privacy preserving decision tree mining from perturbed data

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION COSTS; DATA DISTORTIONS; DATA DISTRIBUTIONS; DATA MINING ALGORITHMS; DATA MINING MODELS; DATA MINING TECHNIQUES; DATA SETS; PRIVACY PRESERVING; PRIVACY-PRESERVING DATA MININGS; SECURE MULTI-PARTY COMPUTATIONS; TRAINING DATA SETS;

EID: 78650760529     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2009.353     Document Type: Conference Paper
Times cited : (32)

References (20)
  • 1
    • 63349109272 scopus 로고    scopus 로고
    • C. C. Aggarwal and P. S. Yu. A condensation approach to privacy preserving data mining
    • C. C. Aggarwal and P. S. Yu. A condensation approach to privacy preserving data mining.
  • 2
    • 0034827009 scopus 로고    scopus 로고
    • On the design and quantification of privacy preserving data mining algorithms
    • ACM
    • D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS. ACM, 2001.
    • (2001) PODS
    • Agrawal, D.1    Aggarwal, C.C.2
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439-450, 2000.
    • (2000) SIGMOD Conference , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 4
    • 33750283449 scopus 로고    scopus 로고
    • Privacy preserving data classification with rotation perturbation
    • K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589-592, 2005.
    • (2005) ICDM , pp. 589-592
    • Chen, K.1    Liu, L.2
  • 6
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy-preserving data mining
    • W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In KDD, pages 505-510, 2003.
    • (2003) KDD , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 8
    • 33749540392 scopus 로고    scopus 로고
    • Privately computing a distributed k-nn classifier
    • J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, editors, PKDD, of, Springer
    • M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, editors, PKDD, volume 3202 of Lecture Notes in Computer Science, pages 279-290. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3202 , pp. 279-290
    • Kantarcioglu, M.1    Clifton, C.2
  • 9
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • IEEE Computer Society
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99-106. IEEE Computer Society, 2003.
    • (2003) ICDM , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 10
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • M. Bellare, editor, CRYPTO, of, Springer
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. In M. Bellare, editor, CRYPTO, volume 1880 of Lecture Notes in Computer Science, pages 36-54. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 11
    • 31344447750 scopus 로고    scopus 로고
    • Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining
    • January
    • K. Liu, H. Kargupta, and J. Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1):92-106, January 2006.
    • (2006) IEEE Transactions on Knowledge and Data Engineering (TKDE) , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 15
    • 0029678894 scopus 로고    scopus 로고
    • Improved use of continuous attributes in c4.5
    • J. R. Quinlan. Improved use of continuous attributes in c4.5. J. Artif. Intell. Res. (JAIR), 4:77-90, 1996.
    • (1996) J. Artif. Intell. Res. (JAIR) , vol.4 , pp. 77-90
    • Quinlan, J.R.1
  • 16
    • 1142294784 scopus 로고    scopus 로고
    • Maintaining data privacy in association rule mining
    • Morgan Kaufmann
    • S. Rizvi and J. R. Haritsa. Maintaining data privacy in association rule mining. In VLDB, pages 682-693. Morgan Kaufmann, 2002.
    • (2002) VLDB , pp. 682-693
    • Rizvi, S.1    Haritsa, J.R.2
  • 17
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy-enhanced database management system
    • B. M. Thuraisingham. Privacy constraint processing in a privacy-enhanced database management system. Data Knowl. Eng., 55(2):159-188, 2005.
    • (2005) Data Knowl. Eng , vol.55 , Issue.2 , pp. 159-188
    • Thuraisingham, B.M.1
  • 18
    • 77952332120 scopus 로고    scopus 로고
    • Privacy-preserving -means clustering over vertically partitioned data
    • J. Vaidya and C. Clifton. Privacy-preserving -means clustering over vertically partitioned data. In KDD, pages 206-215, 2003.
    • (2003) KDD , pp. 206-215
    • Vaidya, J.1    Clifton, C.2
  • 20
    • 33749339031 scopus 로고    scopus 로고
    • Singular value decomposition based data distortion strategy for privacy protection
    • S. Xu, J. Zhang, D. Han, and J. Wang. Singular value decomposition based data distortion strategy for privacy protection. Knowl. Inf. Syst., 10(3):383-397, 2006.
    • (2006) Knowl. Inf. Syst , vol.10 , Issue.3 , pp. 383-397
    • Xu, S.1    Zhang, J.2    Han, D.3    Wang, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.