메뉴 건너뛰기




Volumn 61, Issue 1, 2012, Pages 101-117

Effective reconstruction of data perturbed by random projections

Author keywords

data perturbation; data reconstruction; Maximum A Posteriori; principal component analysis; Privacy preserving data mining; underdetermined independent component analysis

Indexed keywords

DATA PERTURBATION; DATA RECONSTRUCTION; INDEPENDENT COMPONENTS; MAXIMUM A POSTERIORI; PRINCIPAL COMPONENTS; PRIVACY PRESERVING DATA MINING;

EID: 82555168400     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2011.83     Document Type: Article
Times cited : (30)

References (53)
  • 1
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases. A comparative study
    • N. Adam and J. Worthmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989. (Pubitemid 20658272)
    • (1989) Computing surveys , vol.21 , Issue.4 , pp. 515-556
    • Adam Nabil, R.1    Wortmann John, C.2
  • 5
    • 28444434728 scopus 로고    scopus 로고
    • A framework for high-accuracy privacy-preserving mining
    • Proceedings - 21st International Conference on Data Engineering, ICDE 2005
    • S. Agrawal and J. R. Haritsa, "A Framework for High-Accuracy Privacy-Preserving Mining," Proc. 21st Int'l Conf. Data Eng. (ICDE'05), pp. 193-204, 2005. (Pubitemid 41731131)
    • (2005) Proceedings - International Conference on Data Engineering , pp. 193-204
    • Agrawal, S.1    Haritsa, J.R.2
  • 7
    • 0035501128 scopus 로고    scopus 로고
    • Underdetermined blind source separation using sparse representations
    • DOI 10.1016/S0165-1684(01)00120-7, PII S0165168401001207
    • P. Bofill and M. Zibulevsky, "Underdetermined Blind Source Separation Using Sparse Representations," Signal Processing, vol. 81, no. 11, pp. 2353-2362, 2001. (Pubitemid 32943462)
    • (2001) Signal Processing , vol.81 , Issue.11 , pp. 2353-2362
    • Bofill, P.1    Zibulevsky, M.2
  • 8
    • 0030107018 scopus 로고    scopus 로고
    • General approach to blind source separation
    • PII S1053587X96023948
    • X. Cao and R. Liu, "General Approach to Blind Source Separation," IEEE Trans. Signal Processing, vol. 44, no. 3, pp. 562-571, Mar. 1996. (Pubitemid 126777442)
    • (1996) IEEE Transactions on Signal Processing , vol.44 , Issue.3 , pp. 562-571
    • Cao, X.-R.1    Liu, R.-W.2
  • 10
    • 0035273106 scopus 로고    scopus 로고
    • Atomic decomposition by basis pursuit
    • DOI 10.1137/S003614450037906X, PII S003614450037906X
    • S. S. Chen, D. L. Donoho, and M. A. Saunders, "Atomic Decomposition by Basis Pursuit," SIAM Rev., vol. 43, no. 1, pp. 129-159, 2001. (Pubitemid 32406896)
    • (2001) SIAM Review , vol.43 , Issue.1 , pp. 129-159
    • Chen, S.S.1    Donoho, D.L.2    Saunders, M.A.3
  • 11
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty Computation from Threshold Homomorphic Encryption
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • R. Cramer, I. Damgard, and J. Nielsen, "Multiparty Computation1 from Threshold Homomorphic Encryption," EUROCRYPT'01: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 280-300, 2001. (Pubitemid 33275838)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 280-300
    • Cramer, R.1    Damgard, I.2    Nielsen, J.B.3
  • 23
    • 0042826822 scopus 로고    scopus 로고
    • Independent component analysis: Algorithms and applications
    • DOI 10.1016/S0893-6080(00)00026-5, PII S0893608000000265
    • A. Hyärinen and E. Oja, "Independent Component Analysis: Algorithms and Applications," Neural Networks, vol. 13, pp. 411-430, 2000. (Pubitemid 30447427)
    • (2000) Neural Networks , vol.13 , Issue.4-5 , pp. 411-430
    • Hyvarinen, A.1    Oja, E.2
  • 25
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Sept.
    • M. Kantarcioglu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1026-1037, Sept. 2004.
    • (2004) IEEE Trans. Knowledge and Data Eng. , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 26
    • 54649084158 scopus 로고    scopus 로고
    • A consistent modification of a test for independence based on the empirical characteristic function
    • A. Kankainen and N. Ushakov, "A Consistent Modification of a Test for Independence Based on the Empirical Characteristic Function," J. Math. Sciences, vol. 89, no. 5, pp. 1-10, 1998.
    • (1998) J. Math. Sciences , vol.89 , Issue.5 , pp. 1-10
    • Kankainen, A.1    Ushakov, N.2
  • 31
    • 0022130080 scopus 로고
    • A data distortion by probability distribution
    • C. K. Liew, U. J. Choi, and C. J. Liew, "A Data Distortion by Probability Distribution," ACM Trans. Database Systems, vol. 10, no. 3, pp. 395-411, 1985.
    • (1985) ACM Trans. Database Systems , vol.10 , Issue.3 , pp. 395-411
    • Liew, C.K.1    Choi, U.J.2    Liew, C.J.3
  • 33
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • DOI 10.1109/TKDE.2006.14
    • K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp. 92-106, Jan. 2006. (Pubitemid 43145091)
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 38
    • 2942611661 scopus 로고
    • Measures of multivariate skewness and kurtosis with applications
    • K. V. Mardia, "Measures of Multivariate Skewness and Kurtosis with Applications," Biometrika, vol. 57, no. 3, pp. 519-530, 1970.
    • (1970) Biometrika , vol.57 , Issue.3 , pp. 519-530
    • Mardia, K.V.1
  • 39
    • 3042587293 scopus 로고    scopus 로고
    • An appraisal and bibliography of tests for multivariate normality
    • C. J. Mecklin and D. J. Mundfrom, "An Appraisal and Bibliography of Tests for Multivariate Normality," Int'l Statistical Rev., vol. 72, no. 1, pp. 123-138, 2004. (Pubitemid 38845755)
    • (2004) International Statistical Review , vol.72 , Issue.1 , pp. 123-138
    • Mecklin, C.J.1    Mundfrom, D.J.2
  • 40
    • 25444508285 scopus 로고    scopus 로고
    • Survey of sparse and non-sparse methods in source separation
    • DOI 10.1002/ima.20035, Blind Source Separation and De-convolution in Imaging and Image Processing
    • P. D. O'Grady, B. A. Pearlmutter, and S. T. Rickard, "Survey of Sparse and Non-Sparse Methods in Source Separation," Int'l J. Imaging Systems and Technology, vol. 15, no. 1, pp. 18-33, 2005. (Pubitemid 41364763)
    • (2005) International Journal of Imaging Systems and Technology , vol.15 , Issue.1 , pp. 18-33
    • O'Grady, P.D.1    Pearlmutter, B.A.2    Rickard, S.T.3
  • 41
    • 33846830000 scopus 로고    scopus 로고
    • A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
    • DOI 10.1016/j.cose.2006.08.003, PII S0167404806001222
    • S. R. M. Oliveira and O. R. Zäiane, "A Privacy-Preserving Clustering Approach Toward Secure and Effective Data Analysis for Business Collaboration," Computers and Security, vol. 26, no. 1, pp. 81-93, 2007. (Pubitemid 46216492)
    • (2007) Computers and Security , vol.26 , Issue.1 , pp. 81-93
    • Oliveira, S.R.M.1    Zaiane, O.R.2
  • 45
    • 70350675296 scopus 로고    scopus 로고
    • Privacy preserving tuple matching in distributed database
    • Dec.
    • Y. Sang, H. Shen, and H. Tian, "Privacy Preserving Tuple Matching in Distributed Database," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1767-1782, Dec. 2009.
    • (2009) IEEE Trans. Knowledge and Data Eng. , vol.21 , Issue.12 , pp. 1767-1782
    • Sang, Y.1    Shen, H.2    Tian, H.3
  • 46
    • 72449139107 scopus 로고    scopus 로고
    • Efficient and secure protocols for privacy preserving set operations
    • Y. Sang and H. Shen, "Efficient and Secure Protocols for Privacy Preserving Set Operations," ACM Trans. Information and System Security, vol. 13, no. 1, 2009.
    • (2009) ACM Trans. Information and System Security , vol.13 , Issue.1
    • Sang, Y.1    Shen, H.2
  • 47
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Y. Saygin, V. S. Verykios, and C. Clifton, "Using Unknowns to Prevent Discovery of Association Rules," ACM SIGMOD Record, vol. 30, no. 4, pp. 45-54, 2001. (Pubitemid 33720998)
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.S.2    Clifton, C.3
  • 49
    • 0742306442 scopus 로고    scopus 로고
    • A geometric algorithm for overcomplete linear ICA
    • DOI 10.1016/j.neucom.2003.09.008, PII S0925231203005058
    • F. J. Theis, E. W. Lang, and C. G. Puntonet, "A Geometric Algorithm for Overcomplete Linear ICA," Neurocomputing, vol. 56, pp. 381-398, 2004. (Pubitemid 38145634)
    • (2004) Neurocomputing , vol.56 , Issue.1-4 , pp. 381-398
    • Theis, F.J.1    Lang, E.W.2    Puntonet, C.G.3
  • 53
    • 0000660321 scopus 로고    scopus 로고
    • Blind source separation by sparse decomposition in a signal dictionary
    • DOI 10.1162/089976601300014385
    • M. Zibulevsky and B. A. Pearlmutter, "Blind Source Separation by Sparse Decomposition in a Signal Dictionary," Neural Computation, vol. 13, no. 4, pp. 863-882, 2001. (Pubitemid 33594308)
    • (2001) Neural Computation , vol.13 , Issue.4 , pp. 863-882
    • Zibulevsky, M.1    Pearlmutter, B.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.