-
1
-
-
0024914229
-
Security-control methods for statistical databases. A comparative study
-
N. Adam and J. Worthmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, pp. 515-556, 1989. (Pubitemid 20658272)
-
(1989)
Computing surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam Nabil, R.1
Wortmann John, C.2
-
5
-
-
28444434728
-
A framework for high-accuracy privacy-preserving mining
-
Proceedings - 21st International Conference on Data Engineering, ICDE 2005
-
S. Agrawal and J. R. Haritsa, "A Framework for High-Accuracy Privacy-Preserving Mining," Proc. 21st Int'l Conf. Data Eng. (ICDE'05), pp. 193-204, 2005. (Pubitemid 41731131)
-
(2005)
Proceedings - International Conference on Data Engineering
, pp. 193-204
-
-
Agrawal, S.1
Haritsa, J.R.2
-
6
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. Verykios, "Disclosure Limitation of Sensitive Rules," Proc. Workshop Knowledge and Data Eng. Exchange (KDEX'99), pp. 45-52, 1999.
-
(1999)
Proc. Workshop Knowledge and Data Eng. Exchange (KDEX'99)
, pp. 45-52
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.5
-
7
-
-
0035501128
-
Underdetermined blind source separation using sparse representations
-
DOI 10.1016/S0165-1684(01)00120-7, PII S0165168401001207
-
P. Bofill and M. Zibulevsky, "Underdetermined Blind Source Separation Using Sparse Representations," Signal Processing, vol. 81, no. 11, pp. 2353-2362, 2001. (Pubitemid 32943462)
-
(2001)
Signal Processing
, vol.81
, Issue.11
, pp. 2353-2362
-
-
Bofill, P.1
Zibulevsky, M.2
-
8
-
-
0030107018
-
General approach to blind source separation
-
PII S1053587X96023948
-
X. Cao and R. Liu, "General Approach to Blind Source Separation," IEEE Trans. Signal Processing, vol. 44, no. 3, pp. 562-571, Mar. 1996. (Pubitemid 126777442)
-
(1996)
IEEE Transactions on Signal Processing
, vol.44
, Issue.3
, pp. 562-571
-
-
Cao, X.-R.1
Liu, R.-W.2
-
10
-
-
0035273106
-
Atomic decomposition by basis pursuit
-
DOI 10.1137/S003614450037906X, PII S003614450037906X
-
S. S. Chen, D. L. Donoho, and M. A. Saunders, "Atomic Decomposition by Basis Pursuit," SIAM Rev., vol. 43, no. 1, pp. 129-159, 2001. (Pubitemid 32406896)
-
(2001)
SIAM Review
, vol.43
, Issue.1
, pp. 129-159
-
-
Chen, S.S.1
Donoho, D.L.2
Saunders, M.A.3
-
11
-
-
84945124606
-
Multiparty Computation from Threshold Homomorphic Encryption
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
R. Cramer, I. Damgard, and J. Nielsen, "Multiparty Computation1 from Threshold Homomorphic Encryption," EUROCRYPT'01: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 280-300, 2001. (Pubitemid 33275838)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.B.3
-
13
-
-
80053183911
-
A concentration theorem for projections
-
S. Dasgupta, D. Hsu, and N. Verma, "A Concentration Theorem for Projections," Proc. 22nd Conf. Uncertainty in Artificial Intelligence, pp. 1-17, 2006.
-
(2006)
Proc. 22nd Conf. Uncertainty in Artificial Intelligence
, pp. 1-17
-
-
Dasgupta, S.1
Hsu, D.2
Verma, N.3
-
16
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting Privacy Breaches in Privacy Preserving Data Mining," Proc. 22nd ACM Symp. Principles of Database Systems (PODS'03), pp. 211-222, 2003.
-
(2003)
Proc. 22nd ACM Symp. Principles of Database Systems (PODS'03)
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
19
-
-
85162060108
-
A kernel statistical test of independence
-
MIT Press
-
A. Gretton, K. Fukumizu, C. Teo, L. Song, B. Scholkopf, and A. Smola, "A Kernel Statistical Test of Independence," Advances in Neural Information Processing Systems, pp. 585-592, MIT Press, 2007.
-
(2007)
Advances in Neural Information Processing Systems
, pp. 585-592
-
-
Gretton, A.1
Fukumizu, K.2
Teo, C.3
Song, L.4
Scholkopf, B.5
Smola, A.6
-
21
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten, "Lest We Remember: Cold Boot Attacks on Encryption Keys," Proc. 17th USENIX Security Symp., pp. 45-60, 2008.
-
(2008)
Proc. 17th USENIX Security Symp.
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
22
-
-
29844458622
-
Deriving private information from randomized data
-
SIGMOD 2005: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
Z. Huang, W. Du, and B. Chen, "Deriving Private Information from Randomized Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 37-48, 2005. (Pubitemid 43038915)
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
23
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
DOI 10.1016/S0893-6080(00)00026-5, PII S0893608000000265
-
A. Hyärinen and E. Oja, "Independent Component Analysis: Algorithms and Applications," Neural Networks, vol. 13, pp. 411-430, 2000. (Pubitemid 30447427)
-
(2000)
Neural Networks
, vol.13
, Issue.4-5
, pp. 411-430
-
-
Hyvarinen, A.1
Oja, E.2
-
24
-
-
33646017451
-
Privacy preserving clustering
-
S. Jha, L. Kruger, and P. McDaniel, "Privacy Preserving Clustering," Proc. 10th European Symp. Research in Computer Security (ESORICS), pp. 397-417, 2005.
-
(2005)
Proc. 10th European Symp. Research in Computer Security (ESORICS)
, pp. 397-417
-
-
Jha, S.1
Kruger, L.2
McDaniel, P.3
-
25
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Sept.
-
M. Kantarcioglu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 1026-1037, Sept. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
26
-
-
54649084158
-
A consistent modification of a test for independence based on the empirical characteristic function
-
A. Kankainen and N. Ushakov, "A Consistent Modification of a Test for Independence Based on the Empirical Characteristic Function," J. Math. Sciences, vol. 89, no. 5, pp. 1-10, 1998.
-
(1998)
J. Math. Sciences
, vol.89
, Issue.5
, pp. 1-10
-
-
Kankainen, A.1
Ushakov, N.2
-
27
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. Third IEEE Int'l Conf. Data Mining (ICDM'03), pp. 99-106, 2003.
-
(2003)
Proc. Third IEEE Int'l Conf. Data Mining (ICDM'03)
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
28
-
-
0003939997
-
-
Birkhäuser
-
S. Kotz, T. J. Kozubowski, and K. Podgórski, The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance. Birkhäuser, 2001.
-
(2001)
The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance
-
-
Kotz, S.1
Kozubowski, T.J.2
Podgórski, K.3
-
30
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, and S. Venkatasubramanian, "T-Closeness: Privacy Beyond K-Anonymity and L-Diversity," Proc. IEEE 23rd Int'l Conf. Data Eng. (ICDE'07), pp. 106-115, 2007. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
31
-
-
0022130080
-
A data distortion by probability distribution
-
C. K. Liew, U. J. Choi, and C. J. Liew, "A Data Distortion by Probability Distribution," ACM Trans. Database Systems, vol. 10, no. 3, pp. 395-411, 1985.
-
(1985)
ACM Trans. Database Systems
, vol.10
, Issue.3
, pp. 395-411
-
-
Liew, C.K.1
Choi, U.J.2
Liew, C.J.3
-
33
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
DOI 10.1109/TKDE.2006.14
-
K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp. 92-106, Jan. 2006. (Pubitemid 43145091)
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
34
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
Knowledge Discovery in Databases: PKDD 2006 - 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings
-
K. Liu, C. Giannella, and H. Kargupta, "An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining," Proc. Principles of Data Mining and Knowledge Discovery (PKDD'06), pp. 297-308, 2006. (Pubitemid 44617732)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNAI
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
37
-
-
33749607006
-
L-diversity: Privacy beyond K-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond K-Anonymity," Proc. 22nd IEEE Int'l Conf. Data Eng. (ICDE'06), p. 24, 2006.
-
(2006)
Proc. 22nd IEEE Int'l Conf. Data Eng. (ICDE'06)
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
38
-
-
2942611661
-
Measures of multivariate skewness and kurtosis with applications
-
K. V. Mardia, "Measures of Multivariate Skewness and Kurtosis with Applications," Biometrika, vol. 57, no. 3, pp. 519-530, 1970.
-
(1970)
Biometrika
, vol.57
, Issue.3
, pp. 519-530
-
-
Mardia, K.V.1
-
39
-
-
3042587293
-
An appraisal and bibliography of tests for multivariate normality
-
C. J. Mecklin and D. J. Mundfrom, "An Appraisal and Bibliography of Tests for Multivariate Normality," Int'l Statistical Rev., vol. 72, no. 1, pp. 123-138, 2004. (Pubitemid 38845755)
-
(2004)
International Statistical Review
, vol.72
, Issue.1
, pp. 123-138
-
-
Mecklin, C.J.1
Mundfrom, D.J.2
-
40
-
-
25444508285
-
Survey of sparse and non-sparse methods in source separation
-
DOI 10.1002/ima.20035, Blind Source Separation and De-convolution in Imaging and Image Processing
-
P. D. O'Grady, B. A. Pearlmutter, and S. T. Rickard, "Survey of Sparse and Non-Sparse Methods in Source Separation," Int'l J. Imaging Systems and Technology, vol. 15, no. 1, pp. 18-33, 2005. (Pubitemid 41364763)
-
(2005)
International Journal of Imaging Systems and Technology
, vol.15
, Issue.1
, pp. 18-33
-
-
O'Grady, P.D.1
Pearlmutter, B.A.2
Rickard, S.T.3
-
41
-
-
33846830000
-
A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration
-
DOI 10.1016/j.cose.2006.08.003, PII S0167404806001222
-
S. R. M. Oliveira and O. R. Zäiane, "A Privacy-Preserving Clustering Approach Toward Secure and Effective Data Analysis for Business Collaboration," Computers and Security, vol. 26, no. 1, pp. 81-93, 2007. (Pubitemid 46216492)
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 81-93
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
44
-
-
70349967916
-
Reconstructing data perturbed by random projections when the mixing matrix is known
-
Sept.
-
Y. Sang, H. Shen, and H. Tian, "Reconstructing Data Perturbed by Random Projections when the Mixing Matrix Is Known," Proc. European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), pp. 334-349, Sept. 2009.
-
(2009)
Proc. European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD)
, pp. 334-349
-
-
Sang, Y.1
Shen, H.2
Tian, H.3
-
45
-
-
70350675296
-
Privacy preserving tuple matching in distributed database
-
Dec.
-
Y. Sang, H. Shen, and H. Tian, "Privacy Preserving Tuple Matching in Distributed Database," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 1767-1782, Dec. 2009.
-
(2009)
IEEE Trans. Knowledge and Data Eng.
, vol.21
, Issue.12
, pp. 1767-1782
-
-
Sang, Y.1
Shen, H.2
Tian, H.3
-
46
-
-
72449139107
-
Efficient and secure protocols for privacy preserving set operations
-
Y. Sang and H. Shen, "Efficient and Secure Protocols for Privacy Preserving Set Operations," ACM Trans. Information and System Security, vol. 13, no. 1, 2009.
-
(2009)
ACM Trans. Information and System Security
, vol.13
, Issue.1
-
-
Sang, Y.1
Shen, H.2
-
47
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V. S. Verykios, and C. Clifton, "Using Unknowns to Prevent Discovery of Association Rules," ACM SIGMOD Record, vol. 30, no. 4, pp. 45-54, 2001. (Pubitemid 33720998)
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.S.2
Clifton, C.3
-
48
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "K-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
49
-
-
0742306442
-
A geometric algorithm for overcomplete linear ICA
-
DOI 10.1016/j.neucom.2003.09.008, PII S0925231203005058
-
F. J. Theis, E. W. Lang, and C. G. Puntonet, "A Geometric Algorithm for Overcomplete Linear ICA," Neurocomputing, vol. 56, pp. 381-398, 2004. (Pubitemid 38145634)
-
(2004)
Neurocomputing
, vol.56
, Issue.1-4
, pp. 381-398
-
-
Theis, F.J.1
Lang, E.W.2
Puntonet, C.G.3
-
50
-
-
49049096931
-
Disclosure risks of distance preserving data transformations
-
E. O. Turgay, T. B. Pedersen, Y. Saygin, E. Savas, and A. Levi, "Disclosure Risks of Distance Preserving Data Transformations," Proc. 20th Int'l Conf. Scientific and Statistical Database Management (SSDBM'08), pp. 79-94, 2008.
-
(2008)
Proc. 20th Int'l Conf. Scientific and Statistical Database Management (SSDBM'08)
, pp. 79-94
-
-
Turgay, E.O.1
Pedersen, T.B.2
Saygin, Y.3
Savas, E.4
Levi, A.5
-
51
-
-
2142754478
-
Association rule hiding
-
Apr.
-
V. Verykios, A. Elmagarmid, B. Elisa, D. Elena, Y. Saygin, and E. Dasseni, "Association Rule Hiding," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 4, pp. 434-447, Apr. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.1
Elmagarmid, A.2
Elisa, B.3
Elena, D.4
Saygin, Y.5
Dasseni, E.6
-
53
-
-
0000660321
-
Blind source separation by sparse decomposition in a signal dictionary
-
DOI 10.1162/089976601300014385
-
M. Zibulevsky and B. A. Pearlmutter, "Blind Source Separation by Sparse Decomposition in a Signal Dictionary," Neural Computation, vol. 13, no. 4, pp. 863-882, 2001. (Pubitemid 33594308)
-
(2001)
Neural Computation
, vol.13
, Issue.4
, pp. 863-882
-
-
Zibulevsky, M.1
Pearlmutter, B.A.2
|