-
2
-
-
0036887410
-
Protection and administration of XML data sources
-
Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Protection and Administration of XML Data Sources. Data & Knowledge Engineering 43, 237-260 (2002)
-
(2002)
Data & Knowledge Engineering
, vol.43
, pp. 237-260
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
3
-
-
0032027672
-
Data security
-
PII S0169023X97000499
-
Bertino, E.: Data Security. Data & Knowledge Engineering 25, 199-216 (1998) (Pubitemid 128421871)
-
(1998)
Data and Knowledge Engineering
, vol.25
, Issue.1-2
, pp. 199-216
-
-
Bertino, E.1
-
5
-
-
75949107726
-
A novel hybrid protection technique of privacy-preserving data mining and anti-data mining
-
Chen, T.S., Chen, J., Kao, Y.H.: A Novel Hybrid Protection Technique of Privacy-preserving Data Mining and Anti-data Mining. Information Technology Journal 9, 500-505 (2010)
-
(2010)
Information Technology Journal
, vol.9
, pp. 500-505
-
-
Chen, T.S.1
Chen, J.2
Kao, Y.H.3
-
6
-
-
70449367313
-
Research to protect database by shaking random sampling interference (SRSI)
-
Chen, T.S., Chen, J., Lin, Y.C., Tsai, Y.C.: Research to Protect Database by Shaking Random Sampling Interference (SRSI). In: Proceedings of the 2009 Global Congress on Intelligent Systems, pp. 569-572 (2009)
-
(2009)
Proceedings of the 2009 Global Congress on Intelligent Systems
, pp. 569-572
-
-
Chen, T.S.1
Chen, J.2
Lin, Y.C.3
Tsai, Y.C.4
-
7
-
-
33749567418
-
A new binary classifier: Clustering-launched classification
-
Computational Intelligence International Conference on Intelligent Computing, ICIC 2006, Proceedings
-
Chen, T.-S., Lin, C.-C., Chiu, Y.-H., Lin, H.-L., Chen, R.-C.: A New Binary Classifier: Clustering-Launched Classification. In: Huang, D.-S., Li, K., Irwin, G.W. (eds.) ICIC 2006. LNCS (LNAI), vol. 4114, pp. 278-283. Springer, Heidelberg (2006) (Pubitemid 44532264)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4114
, pp. 278-283
-
-
Chen, T.-S.1
Lin, C.-C.2
Chiu, Y.-H.3
Lin, H.-L.4
Chen, R.-C.5
-
8
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.: Tools for Privacy Preserving Distributed Data Mining. ACM SIGKDD Explorations 4, 23-28 (2003)
-
(2003)
ACM SIGKDD Explorations
, vol.4
, pp. 23-28
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.5
-
10
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
Fung, B.C.M., Wangb, K., Wanga, L., Hung, P.C.K.: Privacy-preserving Data Publishing for Cluster Analysis. Data & Knowledge Engineering 68, 552-575 (2009)
-
(2009)
Data & Knowledge Engineering
, vol.68
, pp. 552-575
-
-
Fung, B.C.M.1
Wangb, K.2
Wanga, L.3
Hung, P.C.K.4
-
13
-
-
33746873290
-
A tree-based data perturbation approach for privacy-preserving data mining
-
DOI 10.1109/TKDE.2006.136, 1661517
-
Li, X.B., Sarkar, S.: A Tree-based Data Perturbation Approach for Privacy-preserving Data Mining. IEEE Transactions on Knowledge and Data Engineering 18, 1278-1283 (2006) (Pubitemid 44192193)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.9
, pp. 1278-1283
-
-
Li, X.-B.1
Sarkar, S.2
-
14
-
-
3543076921
-
Application of the GA/KNN method to SELDI proteomics data
-
DOI 10.1093/bioinformatics/bth098
-
Li, L., Umbach, D.M., Terry, P., Taylor, J.A.: Application of the GA/KNNR Method to SELDI Proteomics Data. Bioinformatics 20, 1638-1640 (2004) (Pubitemid 39023169)
-
(2004)
Bioinformatics
, vol.20
, Issue.10
, pp. 1638-1640
-
-
Li, L.1
Umbach, D.M.2
Terry, P.3
Taylor, J.A.4
-
15
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
DOI 10.1109/TKDE.2006.14
-
Liu, K., Kargupta, H.: Random Projection-based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering 18, 92-106 (2006) (Pubitemid 43145091)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
16
-
-
68549115709
-
Decompositional rule extraction from support vector machines by active learning
-
Martens, D., Baesens, B., Gestel, T.V.: Decompositional Rule Extraction from Support Vector Machines by Active Learning. IEEE Transactions on Knowledge and Data Engineering 21, 178-191 (2009)
-
(2009)
IEEE Transactions on Knowledge and Data Engineering
, vol.21
, pp. 178-191
-
-
Martens, D.1
Baesens, B.2
Gestel, T.V.3
-
17
-
-
53349090403
-
Predicting going concern opinion with data mining
-
Martens, D., Bruynseels, L., Baesens, B., Willekens, M., Vanthienen, J.: Predicting Going Concern Opinion with Data Mining. Decision Support Systems 45(4), 765-777 (2008)
-
(2008)
Decision Support Systems
, vol.45
, Issue.4
, pp. 765-777
-
-
Martens, D.1
Bruynseels, L.2
Baesens, B.3
Willekens, M.4
Vanthienen, J.5
-
18
-
-
37049013902
-
VPN technology: IPSEC vs SSL
-
DOI 10.1016/S1353-4858(07)70104-6, PII S1353485807701046
-
Rowan, T.: VPN Technology: IPSEC vs SSL. Network Security 2007, 13-17 (2007) (Pubitemid 350245468)
-
(2007)
Network Security
, vol.2007
, Issue.12
, pp. 13-17
-
-
Rowan, T.1
-
19
-
-
84857440542
-
-
University of Dortmund, Lehrstuhl Informatik
-
Rüping, S.: mySVM-Manual, vol. 8. University of Dortmund, Lehrstuhl Informatik (2000)
-
(2000)
MySVM-Manual
, vol.8
-
-
Rüping, S.1
-
20
-
-
2142754478
-
Association rule hiding
-
Verykios, V.S., Elmagarmid, A.K., Bertino, E., Saygin, Y., Dasseni, E.: Association Rule Hiding. IEEE Transactions on Knowledge and Data Engineering 16, 434-447 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|