-
2
-
-
2942651840
-
-
R-tree portal, http://www.rtreeportal.org.
-
R-tree Portal
-
-
-
3
-
-
48349102436
-
Hiding sequences
-
O. Abul, M. Atzori, F. Bonchi, and F. Giannotti. Hiding sequences. In ICDM Workshops, pages 147-156, 2007.
-
(2007)
ICDM Workshops
, pp. 147-156
-
-
Abul, O.1
Atzori, M.2
Bonchi, F.3
Giannotti, F.4
-
4
-
-
78149260852
-
Hiding sequential and spatiotemporal patterns
-
O. Abul, F. Bonchi, and F. Giannotti. Hiding sequential and spatiotemporal patterns. IEEE TKDE, 22(12):1709-1723, 2010.
-
(2010)
IEEE TKDE
, vol.22
, Issue.12
, pp. 1709-1723
-
-
Abul, O.1
Bonchi, F.2
Giannotti, F.3
-
6
-
-
0029212693
-
Mining sequential patterns
-
R. Agrawal and R. Srikant. Mining sequential patterns. In ICDE, pages 3-14, 1995.
-
(1995)
ICDE
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
7
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. S. Verykios. Disclosure limitation of sensitive rules. In KDEX, pages 45-52, 1999.
-
(1999)
KDEX
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.S.5
-
8
-
-
45749101998
-
Anonymity preserving pattern discovery
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Anonymity preserving pattern discovery. VLDBJ, 17(4):703-727, 2008.
-
(2008)
VLDBJ
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
9
-
-
0242540443
-
Sequential pattern mining using a bitmap representation
-
J. Ayres, J. Flannick, J. Gehrke, and T. Yiu. Sequential pattern mining using a bitmap representation. In KDD, pages 429-435, 2002.
-
(2002)
KDD
, pp. 429-435
-
-
Ayres, J.1
Flannick, J.2
Gehrke, J.3
Yiu, T.4
-
10
-
-
79956041471
-
ρ-uncertainty: Inference-proof transaction anonymization
-
J. Cao, P. Karras, C. Räissi, and K. Tan. ρ-uncertainty: Inference-proof transaction anonymization. PVLDB, 3(1):1033-1044, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1033-1044
-
-
Cao, J.1
Karras, P.2
Räissi, C.3
Tan, K.4
-
11
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
DOI 10.1109/ICDM.2005.121, 1565733, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
K. Chen and L. Liu. Privacy preserving data classification with rotation perturbation. In ICDM, pages 589-592, 2005. (Pubitemid 47385747)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 589-592
-
-
Chen, K.1
Liu, L.2
-
12
-
-
0003504808
-
Security and privacy implications of data mining
-
C. W. Clifton and D. Marks. Security and privacy implications of data mining. In SIGMOD, pages 15-19, 1996.
-
(1996)
SIGMOD
, pp. 15-19
-
-
Clifton, C.W.1
Marks, D.2
-
13
-
-
80052648210
-
Privacy risks in health databases from aggregate disclosure
-
G. Das and N. Zhang. Privacy risks in health databases from aggregate disclosure. In PETRA, pages 1-4, 2009.
-
(2009)
PETRA
, pp. 1-4
-
-
Das, G.1
Zhang, N.2
-
14
-
-
0032108328
-
A Threshold of ln n for Approximating Set Cover
-
U. Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634-652, 1998. (Pubitemid 128488790)
-
(1998)
Journal of the ACM
, vol.45
, Issue.4
, pp. 634-652
-
-
Feige, U.1
-
15
-
-
78650584378
-
Anonymous publication of sensitive transactional data
-
G. Ghinita, P. Kalnis, and Y. Tao. Anonymous publication of sensitive transactional data. IEEE TDKE, 23:161-174, 2011.
-
(2011)
IEEE TDKE
, vol.23
, pp. 161-174
-
-
Ghinita, G.1
Kalnis, P.2
Tao, Y.3
-
21
-
-
77952390550
-
Anonymization of electronic medical records for validating genome-wide association studies
-
G. Loukides, A. Gkoulalas-Divanis, and B. Malin. Anonymization of electronic medical records for validating genome-wide association studies. PNAS, 107(17):7898-7903, 2010.
-
(2010)
PNAS
, vol.107
, Issue.17
, pp. 7898-7903
-
-
Loukides, G.1
Gkoulalas-Divanis, A.2
Malin, B.3
-
22
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
DOI 10.1287/isre.1050.0056
-
S. Menon, S. Sarkar, and S. Mukherjee. Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research, 16(3):256-270, 2005. (Pubitemid 41395566)
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
23
-
-
26844519208
-
Hiding classification rules for data sharing with privacy preservation
-
Data Warehousing and Knowledge Discovery: 7th International Conference, DaWaK 2005. Proceedings
-
J. Natwichai, X. Li, and M. Orlowska. Hiding classification rules for data sharing with privacy preservation. In DAWAK, pages 468-477, 2005. (Pubitemid 41450427)
-
(2005)
Lecture Notes in Computer Science
, vol.3589
, pp. 468-477
-
-
Natwichai, J.1
Li, X.2
Orlowska, M.3
-
24
-
-
0040871512
-
Knowledge discovery as a threat to database security
-
D. E. O'Leary. Knowledge discovery as a threat to database security. In KDD, pages 507-516, 1991.
-
(1991)
KDD
, pp. 507-516
-
-
O'Leary, D.E.1
-
25
-
-
49549095928
-
Protecting sensitive knowledge by data sanitization
-
S. R. M. Oliveira and O. R. Zaïane. Protecting sensitive knowledge by data sanitization. In ICDM, pages 211-218, 2003.
-
(2003)
ICDM
, pp. 211-218
-
-
Oliveira, S.R.M.1
Zaïane, O.R.2
-
26
-
-
0035016443
-
PrefixSpan: Mining sequential patterns efficiently by prefix-projected pattern growth
-
J. Pei, J.Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U. Dayal, and M. Hsu. PrefixSpan: Mining sequential patterns by prefix-projected growth. In ICDE, pages 215-224, 2001. (Pubitemid 32457120)
-
(2001)
Proceedings - International Conference on Data Engineering
, pp. 215-224
-
-
Pei, J.1
Han, J.2
Mortazavi-Asl, B.3
Pinto, H.4
Chen, Q.5
Dayal, U.6
Hsu, M.-C.7
-
27
-
-
63449101050
-
Hiding sensitive frequent itemsets by a border-based approach
-
X. Sun and P. S. Yu. Hiding sensitive frequent itemsets by a border-based approach. Computing Science and Engineering, 1(1):74-94, 2007.
-
(2007)
Computing Science and Engineering
, vol.1
, Issue.1
, pp. 74-94
-
-
Sun, X.1
Yu, P.S.2
-
28
-
-
84859177489
-
Privacy-preserving anonymization of set-valued data
-
M. Terrovitis, N. Mamoulis, and P. Kalnis. Privacy-preserving anonymization of set-valued data. PVLDB, 1(1):115-125, 2008.
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 115-125
-
-
Terrovitis, M.1
Mamoulis, N.2
Kalnis, P.3
-
29
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Emagarmid, E. Bertino, Y. Saygin, and E. Dasseni. Association rule hiding. IEEE TKDE, 16(4):434-447, 2004.
-
(2004)
IEEE TKDE
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Emagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
|