-
1
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in Proc. IEEE SSP, 2008, pp. 111-125.
-
(2008)
Proc. IEEE SSP
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
2
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
Berlin, Germany
-
K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy preserving data mining," in Proc. PKDD, Berlin, Germany, 2006, pp. 297-308.
-
(2006)
Proc. PKDD
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
3
-
-
85088334688
-
Towards attack-resilient geometric data perturbation
-
K. Chen, G. Sun, and L. Liu, "Towards attack-resilient geometric data perturbation," in Proc. SDM, 2008, pp. 78-89.
-
(2008)
Proc. SDM
, pp. 78-89
-
-
Chen, K.1
Sun, G.2
Liu, L.3
-
4
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, " k-anonymity: A model for protecting privacy," Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
5
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Jan.
-
K. Liu, H. Kargupta, and J. Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, pp. 92-106, Jan. 2006.
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
6
-
-
36048948044
-
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
-
Nov.
-
S. Mukherjee, Z. Chen, and A. Gangopadhyay, "A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms," VLDB J., vol. 15, no. 4, pp. 293-315, Nov. 2006.
-
(2006)
VLDB J
, vol.15
, Issue.4
, pp. 293-315
-
-
Mukherjee, S.1
Chen, Z.2
Gangopadhyay, A.3
-
7
-
-
17444432965
-
Hierarchical Kohonenen net for anomaly detection in network security
-
Apr.
-
S. T. Sarasamma, Q. A. Zhu, and J. Huff, "Hierarchical Kohonenen net for anomaly detection in network security," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 35, no. 2, pp. 302-312, Apr. 2005.
-
(2005)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
10
-
-
68049121093
-
Anomaly detection: A survey
-
Jul.
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, Jul. 2009.
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
12
-
-
34248181923
-
Diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, "£ diversity: Privacy beyond k-anonymity," TKDD, vol. 1, no. 1, 2007.
-
(2007)
TKDD
, vol.1
, Issue.1
-
-
MacHanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
13
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and diversity
-
N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and diversity," in Proc. ICDE, 2007, pp. 106-115.
-
(2007)
Proc. ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
14
-
-
55149108163
-
Multiplicative noise for masking continuous data
-
U.S. Bureau Census, Washington, DC, Tech. Rep. Statistics #2003-01 Apr.
-
J. J. Kim and W. E. Winkler, "Multiplicative noise for masking continuous data," Stat. Res. Div., U.S. Bureau Census, Washington, DC, Tech. Rep. Statistics #2003-01, Apr. 2003.
-
(2003)
Stat. Res. Div.
-
-
Kim, J.J.1
Winkler, W.E.2
-
15
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. SIGMOD, May 2000, pp. 439-450.
-
(2000)
Proc. SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
17
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, ON, Canada Oct.
-
A. C. Yao, "How to generate and exchange secrets," in Proc. FOCS, Toronto, ON, Canada, Oct. 1986, pp. 162-167.
-
(1986)
Proc. FOCS
, pp. 162-167
-
-
Yao, A.C.1
-
18
-
-
37249067192
-
Privacy-preserving discovery of frequent patterns in time series
-
J. C. Silva and M. Klusch, "Privacy-preserving discovery of frequent patterns in time series," in Proc. Ind. Conf. Data Mining, 2007, pp. 318-328.
-
(2007)
Proc. Ind. Conf. Data Mining
, pp. 318-328
-
-
Silva, J.C.1
Klusch, M.2
-
19
-
-
33746335051
-
Differential privacy
-
C. Dwork, "Differential privacy," in Proc. ICALP, 2006, vol. 4052 pp. 1-12.
-
(2006)
Proc. ICALP
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
20
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, FL Nov.
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. ICDM, Melbourne, FL, Nov. 2003, pp. 99-106.
-
(2003)
Proc. ICDM
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
21
-
-
35148885090
-
Cancelable biometrics realization with multi-space random projections
-
Oct.
-
A. Teoh and C. T. Yuang, "Cancelable biometrics realization with multi-space random projections," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 5, pp. 1096-1106, Oct. 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.1
Yuang, C.T.2
-
22
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Mar.
-
S. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," J. Amer. Stat. Assoc, vol. 60, no. 309, pp. 63-69, Mar. 1965.
-
(1965)
J. Amer. Stat. Assoc
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.1
-
23
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," in Proc. KDD, 2002, pp. 217-228.
-
(2002)
Proc. KDD
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
24
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in Proc. PODS, 2003, pp. 211-222.
-
(2003)
Proc. PODS
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
25
-
-
0004161838
-
-
New York: Cambridge Univ. Press
-
W H. Press, S. A. Teukolsky, W T. Vetterling, and B. P. Flannery, Numerical Recipes in C: The Art of Scientific Computing, 2nd ed. New York: Cambridge Univ. Press, 1992.
-
(1992)
Numerical Recipes in C: The Art of Scientific Computing, 2nd Ed
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
26
-
-
33747712139
-
Do backpropagation trained neural networks have normal weight distributions?"
-
Amsterdam, The Netherlands Sep.
-
I. Bellido and E. Fiesler, "Do backpropagation trained neural networks have normal weight distributions?" Proc. ICANN, Amsterdam, The Netherlands, Sep. 1993, pp. 772-775.
-
(1993)
Proc. ICANN
, pp. 772-775
-
-
Bellido, I.1
Fiesler, E.2
-
27
-
-
0033703460
-
A full-parallel digital implementation for pre-trained NNs
-
Como, Italy Jul.
-
T. Szabó, L. Antoni, G. Horváth, and B. Fehér, "A full-parallel digital implementation for pre-trained NNs," in Proc. IJCNN, Como, Italy, Jul. 2000, vol. 2, pp. 49-54.
-
(2000)
Proc. IJCNN
, vol.2
, pp. 49-54
-
-
Szabó, T.1
Antoni, L.2
Horváth, G.3
Fehér, B.4
-
28
-
-
1442347115
-
Evaluating neural network predictors by bootstrapping
-
Univ. Colorado Boulder, Boulder, CO, Tech. Rep. CU-CS- 725-94
-
B. Lebaron and A. S. Weigend, "Evaluating neural network predictors by bootstrapping," Comput. Sci. Dept, Univ. Colorado Boulder, Boulder, CO, Tech. Rep. CU-CS-725-94, 1994.
-
(1994)
Comput. Sci. Dept
-
-
Lebaron, B.1
Weigend, A.S.2
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
30
-
-
0034133513
-
Distance-based outliers: Algorithms and applications
-
Feb.
-
E. M. Knorr, R. T. Ng, and V. Tucakov, "Distance-based outliers: Algorithms and applications," VLDB J., vol. 8, no. 3/4, pp. 237-253, Feb. 2000.
-
(2000)
VLDB J
, vol.8
, Issue.3-4
, pp. 237-253
-
-
Knorr, E.M.1
Ng, R.T.2
Tucakov, V.3
-
31
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient algorithms for mining outliers from large data sets," SIGMOD Rec., vol. 29, no. 2, pp. 427-438, 2000.
-
(2000)
SIGMOD Rec
, vol.29
, Issue.2
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
32
-
-
77952380096
-
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
-
S. D. Bay and M. Schwabacher, "Mining distance-based outliers in near linear time with randomization and a simple pruning rule," in Proc. KDD, 2003, pp. 29-38.
-
(2003)
Proc. KDD
, pp. 29-38
-
-
Bay, S.D.1
Schwabacher, M.2
-
33
-
-
69249134301
-
-
NASA Washington, DC, NASA TM- 2007-215026
-
D. K. Frederick, J. A. DeCastro, and J. S. Litt, "User's guide for the commercial modular aero-propulsion system simulation (C-MAPSS)," NASA, Washington, DC, NASA TM-2007-215026, 2007.
-
(2007)
User's Guide for the Commercial Modular Aero-propulsion System Simulation (C-MAPSS)
-
-
Frederick, D.K.1
Decastro, J.A.2
Litt, J.S.3
-
34
-
-
79551686578
-
-
[Online]. Available
-
Dashlink Resources. [Online]. Available: https://dashlink.arc.nasa.gov/ topic/privacy-preserving-outlier-detection-through-random-nonlinear-da/
-
Dashlink Resources
-
-
|