메뉴 건너뛰기




Volumn 369, Issue , 2011, Pages 253-268

Lazy approach to privacy preserving classification with emerging patterns

Author keywords

[No Author keywords available]

Indexed keywords


EID: 80054744162     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-22732-5_21     Document Type: Article
Times cited : (5)

References (26)
  • 1
    • 77952697502 scopus 로고    scopus 로고
    • Study of privacy preserving data mining
    • IEEE Computer Society, Los Alamitos
    • Li, H.: Study of privacy preserving data mining. In: IITSI, pp. 700-703. IEEE Computer Society, Los Alamitos (2010)
    • IITSI , vol.2010 , pp. 700-703
    • Li, H.1
  • 3
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Agrawal, R., Srikant, R.: Privacy-preserving data mining. SIGMOD Rec. 29(2), 439-450 (2000)
    • (2000) SIGMOD Rec. , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 6
    • 35048837125 scopus 로고    scopus 로고
    • Caep: Classification by aggregating emerging patterns
    • Arikawa, S., Nakata, I. (eds.), Springer, Heidelberg
    • Dong, G., Zhang, X.,Wong, L., Li, J.: Caep: Classification by aggregating emerging patterns. In: Arikawa, S., Nakata, I. (eds.) DS 1999. LNCS (LNAI), vol. 1721, pp. 30-42. Springer, Heidelberg (1999)
    • (1999) DS 1999. LNCS (LNAI) , vol.1721 , pp. 30-42
    • Dong, G.1    Zhang, X.2    Wong, L.3    Li, J.4
  • 7
    • 85053374465 scopus 로고    scopus 로고
    • Making use of the most expressive jumping emerging patterns for classification
    • Li, J., Dong, G., Ramamohanarao, K.: Making use of the most expressive jumping emerging patterns for classification. Knowl. Inf. Syst. 3(2), 131-145 (2001)
    • (2001) Knowl. Inf. Syst. , vol.3 , Issue.2 , pp. 131-145
    • Li, J.1    Dong, G.2    Ramamohanarao, K.3
  • 8
    • 84974691373 scopus 로고    scopus 로고
    • Instance-based classification by emerging patterns
    • Zighed, D.A., Komorowski, H.J., ?Zytkow, J.M. (eds.), Springer, Heidelberg
    • Li, J., Dong, G., Ramamohanarao, K.: Instance-based classification by emerging patterns. In: Zighed, D.A., Komorowski, H.J., ?Zytkow, J.M. (eds.) PKDD 2000. LNCS (LNAI), vol. 1910, pp. 191-200. Springer, Heidelberg (2000)
    • (2000) PKDD 2000. LNCS (LNAI) , vol.1910 , pp. 191-200
    • Li, J.1    Dong, G.2    Ramamohanarao, K.3
  • 9
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Bellare, M. (ed.), Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36-54. Springer, Heidelberg (2000)
    • (2000) CRYPTO 2000. LNCS , vol.1880 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 11
    • 84880121624 scopus 로고    scopus 로고
    • Privacy-preserving classification of customer data without loss of accuracy
    • Yang, Z., Zhong, S., Wright, R.N.: Privacy-preserving classification of customer data without loss of accuracy. In: SDM (2005)
    • (2005) SDM
    • Yang, Z.1    Zhong, S.2    Wright, R.N.3
  • 13
    • 35248886066 scopus 로고    scopus 로고
    • Mining multiple private databases using a kNN classifier
    • DOI 10.1145/1244002.1244102, Proceedings of the 2007 ACM Symposium on Applied Computing
    • Xiong, L., Chitti, S., Liu, L.: Mining multiple private databases using a knn classifier. In: Adams, C., Miri, A., Wiener, M. (eds.)SAC 2007: Proceedings of the 2007 ACM Symposium on Applied Computing. LNCS, vol. 4876, pp. 435-440. ACM, New York (2007) (Pubitemid 47568328)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 435-440
    • Xiong, L.1    Chitti, S.2    Liu, L.3
  • 14
    • 80054743927 scopus 로고    scopus 로고
    • Application for privacy-preserving data mining
    • Roy, R. (Ed.), Springer, Heidelberg, doi:10.1007/978-1-84996-338-114
    • Yin, Y., Kaku, I., Tang, J., Zhu, J.: Application for privacy-preserving data mining. In: Roy, R. (ed.) Data Mining. Decision Engineering, pp. 285-309. Springer, Heidelberg (2011), doi:10.1007/978-1-84996-338-1 14
    • Data Mining. Decision Engineering , vol.2011 , pp. 285-309
    • Yin, Y.1    Kaku, I.2    Tang, J.3    Zhu, J.4
  • 15
    • 80054773533 scopus 로고    scopus 로고
    • Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data
    • Kamakshi, P., Babu, A.V.: Preserving privacy and sharing the data in distributed environment using cryptographic technique on perturbed data. In: CoRR, abs/1004.4477 (2010)
    • CoRR, abs/1004.4477 , vol.2010
    • Kamakshi, P.1    Babu, A.V.2
  • 18
    • 38049058382 scopus 로고    scopus 로고
    • Optimization for mask scheme in privacy preserving data mining for association rules
    • Kryszkiewicz, M., Peters, J.F., Rybínski, H., Skowron, A. (eds.), Springer, Heidelberg
    • Andruszkiewicz, P.: Optimization for mask scheme in privacy preserving data mining for association rules. In: Kryszkiewicz, M., Peters, J.F., Rybínski, H., Skowron, A. (eds.) RSEISP 2007. LNCS (LNAI), vol. 4585, pp. 465-474. Springer, Heidelberg (2007)
    • (2007) RSEISP 2007. LNCS (LNAI) , vol.4585 , pp. 465-474
    • Andruszkiewicz, P.1
  • 25
    • 0000259511 scopus 로고    scopus 로고
    • Approximate statistical tests for comparing supervised classification learning algorithms
    • Dietterich, T.G.: Approximate statistical tests for comparing supervised classification learning algorithms. Neural Computation (10), 1895-1924 (1998)
    • (1998) Neural Computation , vol.10 , pp. 1895-1924
    • Dietterich, T.G.1
  • 26
    • 0032091573 scopus 로고    scopus 로고
    • Efficiently mining long patterns from databases
    • Bayardo Jr., R.J.: Efficiently mining long patterns from databases. In: SIGMOD 1998: Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, pp. 85-93. ACM, New York (1998) (Pubitemid 128655959)
    • (1998) SIGMOD Record , vol.27 , Issue.2 , pp. 85-93
    • Bayardo Jr., R.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.