-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
VLDB, Santiago
-
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, September 12-15, pp. 487-499. VLDB, Santiago (1994), http://www.vldb.org/dblp/ db/conf/vldb/vldb94-487.html
-
(1994)
Proceedings of the 20th International Conference on Very Large Data Bases, September 12-15
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
ACM, Dallas
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, May 14-19, pp. 439-450. ACM, Dallas (2000), http://doi.acm.org/10.1145/342009.335438
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, May 14-19
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
0242480964
-
Applying the subdue substructure discovery system to the chemical toxicity domain
-
AAAI Press
-
Chittimoori, R.N., Holder, L.B., Cook, D.J.: Applying the subdue substructure discovery system to the chemical toxicity domain. In: Proceedings of the Twelfth International Florida Artificial Intelligence Research Society Conference, pp. 90-94. AAAI Press (1999), http://dl.acm.org/citation.cfm?id= 646812.707494
-
(1999)
Proceedings of the Twelfth International Florida Artificial Intelligence Research Society Conference
, pp. 90-94
-
-
Chittimoori, R.N.1
Holder, L.B.2
Cook, D.J.3
-
4
-
-
1642302606
-
Building decision tree classifier on private data
-
Clifton, C., Estivill- Castro, V. (eds.) Australian Computer Society, Maebashi City
-
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: Clifton, C., Estivill- Castro, V. (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, December 9, vol. 14, pp. 1-8. Australian Computer Society, Maebashi City (2002), http://crpit.com/Vol14. html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, December 9
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
5
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on the Theory of Computing, pp. 218-229. ACM, New York (1987), http://doi.acm.org/10.1145/28395.28420
-
(1987)
Proceedings of the 19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
6
-
-
85008016154
-
Discovering frequent graph patterns using disjoint paths
-
Gudes, E., Shimony, S.E., Vanetik, N.: Discovering frequent graph patterns using disjoint paths. IEEE Trans. on Knowl. and Data Eng. 18, 1441-1456 (2006), http://dx.doi.org/10.1109/TKDE.2006.173
-
(2006)
IEEE Trans. on Knowl. and Data Eng.
, vol.18
, pp. 1441-1456
-
-
Gudes, E.1
Shimony, S.E.2
Vanetik, N.3
-
7
-
-
0037364958
-
Complete mining of frequent patterns from graphs: Mining graph data
-
Inokuchi, A., Washio, T., Motoda, H.: Complete mining of frequent patterns from graphs: Mining graph data. Mach. Learn. 50, 321-354 (2003), http://dl.acm.org/citation.cfm?id=608108.608123
-
(2003)
Mach. Learn.
, vol.50
, pp. 321-354
-
-
Inokuchi, A.1
Washio, T.2
Motoda, H.3
-
8
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
ACM, Chicago
-
Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and DataMining, August 21-24, pp. 593-599. ACM, Chicago (2005)
-
(2005)
Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and DataMining, August 21-24
, pp. 593-599
-
-
Jagannathan, G.1
Wright, R.N.2
-
9
-
-
20744460179
-
Secure regressions on distributed databases
-
Karr, A.F., Lin, X., Sanil, A.P., Reiter, J.P.: Secure regressions on distributed databases. Journal of Computational and Graphical Statistics 14, 263-279 (2005)
-
(2005)
Journal of Computational and Graphical Statistics
, vol.14
, pp. 263-279
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
10
-
-
78149312583
-
Frequent subgraph discovery
-
Cercone, N., Lin, T.Y., Wu, X. (eds.) IEEE Computer Society
-
Kuramochi, M., Karypis, G.: Frequent subgraph discovery. In: Cercone, N., Lin, T.Y., Wu, X. (eds.) ICDM, pp. 313-320. IEEE Computer Society (2001)
-
(2001)
ICDM
, pp. 313-320
-
-
Kuramochi, M.1
Karypis, G.2
-
11
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15(3), 177-206 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
13
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24, 106-110 (1978)
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
15
-
-
42549155482
-
Structural web search engine
-
Rakhshan, A., Holder, L.B., Cook, D.J.: Structural web search engine. International Journal on Artificial Intelligence Tools 13(1), 27-44 (2004)
-
(2004)
International Journal on Artificial Intelligence Tools
, vol.13
, Issue.1
, pp. 27-44
-
-
Rakhshan, A.1
Holder, L.B.2
Cook, D.J.3
-
16
-
-
12244286332
-
Privacy preserving regression modelling via distributed computation
-
ACMPress, New York
-
Sanil, A.P., Karr, A.F., Lin, X., Reiter, J.P.: Privacy preserving regression modelling via distributed computation. In: KDD 2004: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 677-682. ACMPress, New York (2004)
-
(2004)
KDD 2004: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 677-682
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
17
-
-
0032611213
-
Application of knowledge discovery to molecular biology: Identifying structural regularities in proteins
-
Su, S., Cook, D.J., Holder, L.B.: Application of knowledge discovery to molecular biology: Identifying structural regularities in proteins. In: Pacific Symposium on Biocomputing, pp. 190-201 (1999)
-
(1999)
Pacific Symposium on Biocomputing
, pp. 190-201
-
-
Su, S.1
Cook, D.J.2
Holder, L.B.3
-
18
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
ACM, Washington, DC
-
Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27, pp. 206-215. ACM, Washington, DC (2003), http://doi.acm.org/10.1145/956750.956776
-
(2003)
The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24-27
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
19
-
-
2942536415
-
Privacy preserving naïve bayes classifier for vertically partitioned data
-
SIAM, Philadelphia
-
Vaidya, J., Clifton, C.: Privacy preserving naïve bayes classifier for vertically partitioned data. In: 2004 SIAM International Conference on Data Mining, April 22-24, pp. 522-526. SIAM, Philadelphia (2004)
-
(2004)
2004 SIAM International Conference on Data Mining, April 22-24
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
20
-
-
19544394594
-
Privacy-preserving outlier detection
-
IEEE Computer Society Press, Los Alamitos
-
Vaidya, J., Clifton, C.: Privacy-preserving outlier detection. In: Proceedings of the Fourth IEEE International Conference on Data Mining (ICDM 2004), November 1-4, pp. 233-240. IEEE Computer Society Press, Los Alamitos (2004)
-
(2004)
Proceedings of the Fourth IEEE International Conference on Data Mining (ICDM 2004), November 1-4
, pp. 233-240
-
-
Vaidya, J.1
Clifton, C.2
-
21
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security 13(4), 593-622 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
22
-
-
55149091380
-
Privacy-preserving decision trees over vertically partitioned data
-
Vaidya, J., Clifton, C., Kantarcioglu, M., Patterson, A.S.: Privacy-preserving decision trees over vertically partitioned data. ACM Trans. Knowl. Discov. Data 2(3), 1-27 (2008)
-
(2008)
ACM Trans. Knowl. Discov. Data
, vol.2
, Issue.3
, pp. 1-27
-
-
Vaidya, J.1
Clifton, C.2
Kantarcioglu, M.3
Patterson, A.S.4
-
23
-
-
78149333073
-
Gspan: Graph-based substructure pattern mining
-
Yan, X., Han, J.: gspan: Graph-based substructure pattern mining. In: ICDM, pp. 721-724 (2002)
-
(2002)
ICDM
, pp. 721-724
-
-
Yan, X.1
Han, J.2
|