메뉴 건너뛰기




Volumn 41, Issue 1, 2011, Pages 260-272

Privacy-preserving outlier detection through random nonlinear data distortion

Author keywords

Data mining; non linear; perturbation; privacy preserving

Indexed keywords

ANOMALY DETECTION; DATA MINERS; DEGREE OF NON-LINEARITY; INVERTIBILITY; LINEAR MODEL; NON-LINEAR; NON-LINEAR MODEL; NON-LINEAR TRANSFORMATIONS; NONLINEAR DATA; OUTLIER DETECTION; PERTURBATION; PRIVACY PRESERVATION; PRIVACY PRESERVING DATA MINING; PRIVACY-PRESERVING; RANDOM DATA; REAL LIFE DATASETS; SENSITIVE DATAS; SENSITIVE INFORMATIONS; SIGMOID FUNCTION; SPECIFIC PROBLEMS; STANDARD DEFINITIONS;

EID: 79551683372     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2010.2051540     Document Type: Article
Times cited : (33)

References (34)
  • 1
    • 50249142450 scopus 로고    scopus 로고
    • Robust de-anonymization of large sparse datasets
    • A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets," in Proc. IEEE SSP, 2008, pp. 111-125.
    • (2008) Proc. IEEE SSP , pp. 111-125
    • Narayanan, A.1    Shmatikov, V.2
  • 2
    • 33750293582 scopus 로고    scopus 로고
    • An attacker's view of distance preserving maps for privacy preserving data mining
    • Berlin, Germany
    • K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy preserving data mining," in Proc. PKDD, Berlin, Germany, 2006, pp. 297-308.
    • (2006) Proc. PKDD , pp. 297-308
    • Liu, K.1    Giannella, C.2    Kargupta, H.3
  • 3
    • 85088334688 scopus 로고    scopus 로고
    • Towards attack-resilient geometric data perturbation
    • K. Chen, G. Sun, and L. Liu, "Towards attack-resilient geometric data perturbation," in Proc. SDM, 2008, pp. 78-89.
    • (2008) Proc. SDM , pp. 78-89
    • Chen, K.1    Sun, G.2    Liu, L.3
  • 5
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Jan.
    • K. Liu, H. Kargupta, and J. Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, pp. 92-106, Jan. 2006.
    • (2006) IEEE Trans. Knowl. Data Eng. , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 6
    • 36048948044 scopus 로고    scopus 로고
    • A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
    • Nov.
    • S. Mukherjee, Z. Chen, and A. Gangopadhyay, "A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms," VLDB J., vol. 15, no. 4, pp. 293-315, Nov. 2006.
    • (2006) VLDB J , vol.15 , Issue.4 , pp. 293-315
    • Mukherjee, S.1    Chen, Z.2    Gangopadhyay, A.3
  • 7
    • 17444432965 scopus 로고    scopus 로고
    • Hierarchical Kohonenen net for anomaly detection in network security
    • Apr.
    • S. T. Sarasamma, Q. A. Zhu, and J. Huff, "Hierarchical Kohonenen net for anomaly detection in network security," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 35, no. 2, pp. 302-312, Apr. 2005.
    • (2005) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.35 , Issue.2 , pp. 302-312
    • Sarasamma, S.T.1    Zhu, Q.A.2    Huff, J.3
  • 10
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • Jul.
    • V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, Jul. 2009.
    • (2009) ACM Comput. Surv. , vol.41 , Issue.3 , pp. 1-58
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 13
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and diversity
    • N. Li, T. Li, and S. Venkatasubramanian, "t-closeness: Privacy beyond k-anonymity and diversity," in Proc. ICDE, 2007, pp. 106-115.
    • (2007) Proc. ICDE , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 14
    • 55149108163 scopus 로고    scopus 로고
    • Multiplicative noise for masking continuous data
    • U.S. Bureau Census, Washington, DC, Tech. Rep. Statistics #2003-01 Apr.
    • J. J. Kim and W. E. Winkler, "Multiplicative noise for masking continuous data," Stat. Res. Div., U.S. Bureau Census, Washington, DC, Tech. Rep. Statistics #2003-01, Apr. 2003.
    • (2003) Stat. Res. Div.
    • Kim, J.J.1    Winkler, W.E.2
  • 15
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • May
    • R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. SIGMOD, May 2000, pp. 439-450.
    • (2000) Proc. SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 17
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • Toronto, ON, Canada Oct.
    • A. C. Yao, "How to generate and exchange secrets," in Proc. FOCS, Toronto, ON, Canada, Oct. 1986, pp. 162-167.
    • (1986) Proc. FOCS , pp. 162-167
    • Yao, A.C.1
  • 18
    • 37249067192 scopus 로고    scopus 로고
    • Privacy-preserving discovery of frequent patterns in time series
    • J. C. Silva and M. Klusch, "Privacy-preserving discovery of frequent patterns in time series," in Proc. Ind. Conf. Data Mining, 2007, pp. 318-328.
    • (2007) Proc. Ind. Conf. Data Mining , pp. 318-328
    • Silva, J.C.1    Klusch, M.2
  • 19
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork, "Differential privacy," in Proc. ICALP, 2006, vol. 4052 pp. 1-12.
    • (2006) Proc. ICALP , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 20
    • 78149340011 scopus 로고    scopus 로고
    • On the privacy preserving properties of random data perturbation techniques
    • Melbourne, FL Nov.
    • H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in Proc. ICDM, Melbourne, FL, Nov. 2003, pp. 99-106.
    • (2003) Proc. ICDM , pp. 99-106
    • Kargupta, H.1    Datta, S.2    Wang, Q.3    Sivakumar, K.4
  • 21
    • 35148885090 scopus 로고    scopus 로고
    • Cancelable biometrics realization with multi-space random projections
    • Oct.
    • A. Teoh and C. T. Yuang, "Cancelable biometrics realization with multi-space random projections," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 5, pp. 1096-1106, Oct. 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. B, Cybern. , vol.37 , Issue.5 , pp. 1096-1106
    • Teoh, A.1    Yuang, C.T.2
  • 22
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • Mar.
    • S. Warner, "Randomized response: A survey technique for eliminating evasive answer bias," J. Amer. Stat. Assoc, vol. 60, no. 309, pp. 63-69, Mar. 1965.
    • (1965) J. Amer. Stat. Assoc , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.1
  • 24
    • 1142263341 scopus 로고    scopus 로고
    • Limiting privacy breaches in privacy preserving data mining
    • A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in Proc. PODS, 2003, pp. 211-222.
    • (2003) Proc. PODS , pp. 211-222
    • Evfimievski, A.1    Gehrke, J.2    Srikant, R.3
  • 26
    • 33747712139 scopus 로고
    • Do backpropagation trained neural networks have normal weight distributions?"
    • Amsterdam, The Netherlands Sep.
    • I. Bellido and E. Fiesler, "Do backpropagation trained neural networks have normal weight distributions?" Proc. ICANN, Amsterdam, The Netherlands, Sep. 1993, pp. 772-775.
    • (1993) Proc. ICANN , pp. 772-775
    • Bellido, I.1    Fiesler, E.2
  • 27
    • 0033703460 scopus 로고    scopus 로고
    • A full-parallel digital implementation for pre-trained NNs
    • Como, Italy Jul.
    • T. Szabó, L. Antoni, G. Horváth, and B. Fehér, "A full-parallel digital implementation for pre-trained NNs," in Proc. IJCNN, Como, Italy, Jul. 2000, vol. 2, pp. 49-54.
    • (2000) Proc. IJCNN , vol.2 , pp. 49-54
    • Szabó, T.1    Antoni, L.2    Horváth, G.3    Fehér, B.4
  • 28
    • 1442347115 scopus 로고
    • Evaluating neural network predictors by bootstrapping
    • Univ. Colorado Boulder, Boulder, CO, Tech. Rep. CU-CS- 725-94
    • B. Lebaron and A. S. Weigend, "Evaluating neural network predictors by bootstrapping," Comput. Sci. Dept, Univ. Colorado Boulder, Boulder, CO, Tech. Rep. CU-CS-725-94, 1994.
    • (1994) Comput. Sci. Dept
    • Lebaron, B.1    Weigend, A.S.2
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0034133513 scopus 로고    scopus 로고
    • Distance-based outliers: Algorithms and applications
    • Feb.
    • E. M. Knorr, R. T. Ng, and V. Tucakov, "Distance-based outliers: Algorithms and applications," VLDB J., vol. 8, no. 3/4, pp. 237-253, Feb. 2000.
    • (2000) VLDB J , vol.8 , Issue.3-4 , pp. 237-253
    • Knorr, E.M.1    Ng, R.T.2    Tucakov, V.3
  • 31
    • 0039845384 scopus 로고    scopus 로고
    • Efficient algorithms for mining outliers from large data sets
    • S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient algorithms for mining outliers from large data sets," SIGMOD Rec., vol. 29, no. 2, pp. 427-438, 2000.
    • (2000) SIGMOD Rec , vol.29 , Issue.2 , pp. 427-438
    • Ramaswamy, S.1    Rastogi, R.2    Shim, K.3
  • 32
    • 77952380096 scopus 로고    scopus 로고
    • Mining distance-based outliers in near linear time with randomization and a simple pruning rule
    • S. D. Bay and M. Schwabacher, "Mining distance-based outliers in near linear time with randomization and a simple pruning rule," in Proc. KDD, 2003, pp. 29-38.
    • (2003) Proc. KDD , pp. 29-38
    • Bay, S.D.1    Schwabacher, M.2
  • 34
    • 79551686578 scopus 로고    scopus 로고
    • [Online]. Available
    • Dashlink Resources. [Online]. Available: https://dashlink.arc.nasa.gov/ topic/privacy-preserving-outlier-detection-through-random-nonlinear-da/
    • Dashlink Resources


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.