-
1
-
-
80052799499
-
Privacy-Preserving Data Mining. Models and Algorithms of
-
Aggarwal, C. C. and Yu, P. S. (2008). Privacy-Preserving Data Mining. Models and Algorithms, Vol. 34 of Advances in Database Systems.
-
(2008)
Advances in Database Systems
, vol.34
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
6
-
-
78650947844
-
A privacy-preserving data publishing algorithm for clustering application
-
Chong, Z. H, Ni, W. W., Liu, T. T. and Zhang, Y. (2010). A privacy-preserving data publishing algorithm for clustering application. Computer Research and Development, 47(12), 2083-2089.
-
(2010)
Computer Research and Development
, vol.47
, Issue.12
, pp. 2083-2089
-
-
Chong, Z.H.1
Ni, W.W.2
Liu, T.T.3
Zhang, Y.4
-
11
-
-
84863995752
-
-
New Fundamental Technologies in Data Mining
-
Ge, X. J. and Zhu, J. M. (2011). Privacy Preserving Data Mining. New Fundamental Technologies in Data Mining, 535-560.
-
(2011)
Privacy Preserving Data Mining
, pp. 535-560
-
-
Ge, X.J.1
Zhu, J.M.2
-
12
-
-
33750283830
-
On the lower bound of reconstruction error for spectral filtering based privacy preserving data mining
-
Berlin, Germany
-
Guo, S., Wu, X. and Li, Y. (2006). On the lower bound of reconstruction error for spectral filtering based privacy preserving data mining. In Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases. Berlin, Germany, 520-527.
-
(2006)
Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 520-527
-
-
Guo, S.1
Wu, X.2
Li, Y.3
-
14
-
-
29844458622
-
Deriving private information from randomized data
-
Huang, Z., Du, W. and Chen, B. (2005). Deriving private information from randomized data. In Proceedings of the 2005 ACM SIGMOD Conference. Baltimore, MD, 37-48.
-
(2005)
Proceedings of the 2005 ACM SIGMOD Conference. Baltimore, MD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
15
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, FL
-
Kargupta, H., Datta, S., Wang, Q. and Sivakumar, K. (2003). On the privacy preserving properties of random data perturbation techniques. In Proceeding of the IEEE International Conference on Data Mining. Melbourne, FL, 99-106.
-
(2003)
Proceeding of the IEEE International Conference on Data Mining
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
16
-
-
77955188384
-
-
Architecture for Preserving Privacy During Data Mining by Hybridization of Partitioning on Medical Data
-
Khatri, A., Kabra, S. and Singh, S. (2010). Architecture for Preserving Privacy During Data Mining by Hybridization of Partitioning on Medical Data, 93-97.
-
(2010)
, pp. 93-97
-
-
Khatri, A.1
Kabra, S.2
Singh, S.3
-
19
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu, K. Kargupta, H. and Ryan, J. (2006). Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on knowledge and Data Engineering, 18(1), 92-106.
-
(2006)
IEEE Transactions on knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
20
-
-
33750293582
-
An Attackers View of Distance Preserving Maps for Privacy Preserving Data Mining
-
Berlin, Germany
-
Liu, K., Giannella, C. and Kargupta, H. (2006). An Attackers View of Distance Preserving Maps for Privacy Preserving Data Mining. In the Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases. Berlin, Germany, 297-308.
-
(2006)
the Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
23
-
-
33646367179
-
Data shuffing-a new masking approach for numerical data
-
Muralidhar, K. and Sarathy, R. (2006). Data shuffing-a new masking approach for numerical data. Management Science, 52(5), 658-670.
-
(2006)
Management Science
, vol.52
, Issue.5
, pp. 658-670
-
-
Muralidhar, K.1
Sarathy, R.2
-
24
-
-
84873683708
-
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
-
Mohammad, A. K. and Somayajulu, D.V.L.N. (2010). A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining. Journal of Computing, 2(1), 2151-9617.
-
(2010)
Journal of Computing
, vol.2
, Issue.1
, pp. 2151-9617
-
-
Mohammad, A.K.1
Somayajulu, D.V.L.N.2
-
25
-
-
78049385533
-
Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform
-
Mohammad, A. K. and Somayajulu, D.V.L.N. (2010). Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform. LNCS, 6283(1), 202-209.
-
(2010)
LNCS
, vol.6283
, Issue.1
, pp. 202-209
-
-
Mohammad, A.K.1
Somayajulu, D.V.L.N.2
-
28
-
-
77954619865
-
Distance functions, clustering algorithms and microarray data analysis
-
Venice, Italy
-
Raaele Giancarlo, Giosue Lo Bosco, Luca Pinello. (2010). Distance functions, clustering algorithms and microarray data analysis. In Proceedings of the 4th International Conference on Learning and Intelligent Optimization. Venice, Italy, 125-138.
-
(2010)
Proceedings of the 4th International Conference on Learning and Intelligent Optimization
, pp. 125-138
-
-
Giancarlo, R.1
Bosco, G.L.2
Pinello, L.3
-
29
-
-
84863991177
-
-
(2011) [Online]. Available
-
Radhakisan Baheti, Helen Gill. (2011). Cyber-physical Systems. (2011). [Online]. Available: http://ieeecss.org/main/images/documents/IoCT-Part3-02CyberphysicalSystems.pdf
-
(2011)
Cyber-physical Systems
-
-
Baheti, R.1
Gill, H.2
-
30
-
-
70349315115
-
Importance of Data Standardization in Privacy-Preserving K-Means Clustering
-
Brisbane, QLD, Australia
-
Su, C. H., Zhan, J. and Sakurai. K. (2009). Importance of Data Standardization in Privacy-Preserving K-Means Clustering. In the Proceedings of International Workshops on Database Systems for Advanced Applications. Brisbane, QLD, Australia, 276-286.
-
(2009)
the Proceedings of International Workshops on Database Systems for Advanced Applications
, pp. 276-286
-
-
Su, C.H.1
Zhan, J.2
Sakurai, K.3
-
31
-
-
84864016893
-
A Distributed Cyber-based Information Distillation and Control Architecture for Wireless Healthcare Systems
-
New Orleans, Louisiana, USA
-
Shen, H. Y., Li, Z. and Yang, L. L. (2009). A Distributed Cyber-based Information Distillation and Control Architecture for Wireless Healthcare Systems. In Proceedings of the 1st ACM international workshop on Medical-grade wireless networks. New Orleans, Louisiana, USA, 33-37.
-
(2009)
Proceedings of the 1st ACM international workshop on Medical-grade wireless networks
, pp. 33-37
-
-
Shen, H.Y.1
Li, Z.2
Yang, L.L.3
-
32
-
-
25144439604
-
-
Addison-Wesley, Reading, MA
-
Tan, P., Steinbach, M. and Kumar, V. (2006). Introduction to Data Mining. Addison-Wesley, Reading, MA.
-
(2006)
Introduction to Data Mining
-
-
Tan, P.1
Steinbach, M.2
Kumar, V.3
-
33
-
-
78650175556
-
Using data mining techniques to predict hospitalization of hemodialysis patients
-
Yeh, Y. J., Wu, T. H. and Tsao, C. W. (2010). Using data mining techniques to predict hospitalization of hemodialysis patients. Decision Support Systems, Vol. 50, 439-448.
-
(2010)
Decision Support Systems
, vol.50
, pp. 439-448
-
-
Yeh, Y.J.1
Wu, T.H.2
Tsao, C.W.3
-
34
-
-
77950343104
-
Privacy protection by matrix transformation
-
E92-D
-
Yang, W. J. (2009). Privacy protection by matrix transformation. IEICE Transactions on Information and Systems, E92-D(4), 740-741.
-
(2009)
IEICE Transactions on Information and Systems
, Issue.4
, pp. 740-741
-
-
Yang, W.J.1
|