-
1
-
-
63349109272
-
-
C. C. Aggarwal and P. S. Yu. A condensation approach to privacy preserving data mining
-
C. C. Aggarwal and P. S. Yu. A condensation approach to privacy preserving data mining.
-
-
-
-
2
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
ACM
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In PODS. ACM, 2001.
-
(2001)
PODS
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD Conference, pages 439-450, 2000.
-
(2000)
SIGMOD Conference
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589-592, 2005.
-
(2005)
ICDM
, pp. 589-592
-
-
Chen, K.1
Liu, L.2
-
5
-
-
10044273842
-
Tools for privacy preserving data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. Tools for privacy preserving data mining. SIGKDD Explorations, 4(2):28-34, 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
6
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In KDD, pages 505-510, 2003.
-
(2003)
KDD
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
7
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. V. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 217-228, 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.V.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
8
-
-
33749540392
-
Privately computing a distributed k-nn classifier
-
J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, editors, PKDD, of, Springer
-
M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In J.-F. Boulicaut, F. Esposito, F. Giannotti, and D. Pedreschi, editors, PKDD, volume 3202 of Lecture Notes in Computer Science, pages 279-290. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3202
, pp. 279-290
-
-
Kantarcioglu, M.1
Clifton, C.2
-
9
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
IEEE Computer Society
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM, pages 99-106. IEEE Computer Society, 2003.
-
(2003)
ICDM
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
10
-
-
84974555530
-
Privacy preserving data mining
-
M. Bellare, editor, CRYPTO, of, Springer
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. In M. Bellare, editor, CRYPTO, volume 1880 of Lecture Notes in Computer Science, pages 36-54. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
11
-
-
31344447750
-
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining
-
January
-
K. Liu, H. Kargupta, and J. Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1):92-106, January 2006.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
15
-
-
0029678894
-
Improved use of continuous attributes in c4.5
-
J. R. Quinlan. Improved use of continuous attributes in c4.5. J. Artif. Intell. Res. (JAIR), 4:77-90, 1996.
-
(1996)
J. Artif. Intell. Res. (JAIR)
, vol.4
, pp. 77-90
-
-
Quinlan, J.R.1
-
16
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
Morgan Kaufmann
-
S. Rizvi and J. R. Haritsa. Maintaining data privacy in association rule mining. In VLDB, pages 682-693. Morgan Kaufmann, 2002.
-
(2002)
VLDB
, pp. 682-693
-
-
Rizvi, S.1
Haritsa, J.R.2
-
17
-
-
24644455920
-
Privacy constraint processing in a privacy-enhanced database management system
-
B. M. Thuraisingham. Privacy constraint processing in a privacy-enhanced database management system. Data Knowl. Eng., 55(2):159-188, 2005.
-
(2005)
Data Knowl. Eng
, vol.55
, Issue.2
, pp. 159-188
-
-
Thuraisingham, B.M.1
-
18
-
-
77952332120
-
Privacy-preserving -means clustering over vertically partitioned data
-
J. Vaidya and C. Clifton. Privacy-preserving -means clustering over vertically partitioned data. In KDD, pages 206-215, 2003.
-
(2003)
KDD
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
20
-
-
33749339031
-
Singular value decomposition based data distortion strategy for privacy protection
-
S. Xu, J. Zhang, D. Han, and J. Wang. Singular value decomposition based data distortion strategy for privacy protection. Knowl. Inf. Syst., 10(3):383-397, 2006.
-
(2006)
Knowl. Inf. Syst
, vol.10
, Issue.3
, pp. 383-397
-
-
Xu, S.1
Zhang, J.2
Han, D.3
Wang, J.4
|