-
2
-
-
84974555530
-
Privacy preserving data mining
-
Y. Lindell, and B. Pinkas Privacy preserving data mining Proceedings of the 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA 2000 36 54
-
(2000)
Proceedings of the 20th Annual International Cryptology Conference (CRYPTO), Santa Barbara, CA, USA
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal, and R. Srikant Privacy-preserving data mining Proceedings of the ACM Special Interest Group on Management of Data Conference (SIGMOD), Dallas, TX, USA 2000 439 450
-
(2000)
Proceedings of the ACM Special Interest Group on Management of Data Conference (SIGMOD), Dallas, TX, USA
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
26444604855
-
Privacy-preserving decision trees over vertically partitioned data
-
J. Vaidya, and C. Clifton Privacy-preserving decision trees over vertically partitioned data Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Storrs, CT, USA 2005 139 152
-
(2005)
Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Storrs, CT, USA
, pp. 139-152
-
-
Vaidya, J.1
Clifton, C.2
-
5
-
-
26444575051
-
Defining privacy for data mining
-
C. Clifton, M. Kantarcioglu, and J. Vaidya Defining privacy for data mining Proceedings of the National Science Foundation Workshop on Next Generation Data Mining (NGDM), Baltimore, MD, USA 2002 126 133
-
(2002)
Proceedings of the National Science Foundation Workshop on Next Generation Data Mining (NGDM), Baltimore, MD, USA
, pp. 126-133
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
6
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioglu, and C. Clifton Privacy-preserving distributed mining of association rules on horizontally partitioned data IEEE Transactions on Knowledge and Data Engineering 16 9 2004 1026 1037
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
7
-
-
26444613270
-
Privacy-preserving collaborative association rule mining
-
J.Z. Zhan, S. Matwin, and L. Chang Privacy-preserving collaborative association rule mining Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Storrs, CT, USA 2005 153 165
-
(2005)
Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Storrs, CT, USA
, pp. 153-165
-
-
Zhan, J.Z.1
Matwin, S.2
Chang, L.3
-
8
-
-
33947202250
-
An incremental algorithm for mining privacy-preserving frequent itemsets
-
J.-L. Wang, C.-F. Xu, and Y.-H. Pan An incremental algorithm for mining privacy-preserving frequent itemsets Proceeding of the International Conference on Machine Learning and Cybernetics (ICMLC), Dalian, China 2006 1132 1137
-
(2006)
Proceeding of the International Conference on Machine Learning and Cybernetics (ICMLC), Dalian, China
, pp. 1132-1137
-
-
Wang, J.-L.1
Xu, C.-F.2
Pan, Y.-H.3
-
9
-
-
50049100629
-
Data privacy protection in multi-party clustering
-
W. Yang, and S. Huang Data privacy protection in multi-party clustering Data & Knowledge Engineering 67 1 2008 185 199
-
(2008)
Data & Knowledge Engineering
, vol.67
, Issue.1
, pp. 185-199
-
-
Yang, W.1
Huang, S.2
-
10
-
-
34548668665
-
Privacy preserving clustering on horizontally partitioned data
-
A. Inan, S.V. Kaya, Y. Saygin, E. Savas, A.A. Hintoglu, and A. Levi Privacy preserving clustering on horizontally partitioned data Data & Knowledge Engineering 63 3 2008 646 666
-
(2008)
Data & Knowledge Engineering
, vol.63
, Issue.3
, pp. 646-666
-
-
Inan, A.1
Kaya, S.V.2
Saygin, Y.3
Savas, E.4
Hintoglu, A.A.5
Levi, A.6
-
11
-
-
64549145427
-
Privacy-preserving data publishing for cluster analysis
-
B.C. Fung, K. Wang, L. Wang, and P.C. Hung Privacy-preserving data publishing for cluster analysis Data & Knowledge Engineering 68 6 2009 552 575
-
(2009)
Data & Knowledge Engineering
, vol.68
, Issue.6
, pp. 552-575
-
-
Fung, B.C.1
Wang, K.2
Wang, L.3
Hung, P.C.4
-
12
-
-
67649816020
-
Privacy preserving k-means clustering in multi-party environment
-
S. Samet, A. Miri, and L. Orozco-Barbosa Privacy preserving k-means clustering in multi-party environment Proceedings of the International Conference on Security and Cryptography (SECRYPT), Barcelona, Spain 2007 381 385
-
(2007)
Proceedings of the International Conference on Security and Cryptography (SECRYPT), Barcelona, Spain
, pp. 381-385
-
-
Samet, S.1
Miri, A.2
Orozco-Barbosa, L.3
-
13
-
-
63749090809
-
Distributed privacy preserving k-means clustering with additive secret sharing
-
ACM New York, NY, USA
-
M.C. Doganay, T.B. Pedersen, Y. Saygin, E. Savaş, and A. Levi Distributed privacy preserving k-means clustering with additive secret sharing Proceedings of the 2008 international workshop on Privacy and anonymity in information society, PAIS '08 2008 ACM New York, NY, USA 3 11
-
(2008)
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS '08
, pp. 3-11
-
-
Doganay, M.C.1
Pedersen, T.B.2
Saygin, Y.3
Savaş, E.4
Levi, A.5
-
14
-
-
71749085624
-
Formal anonymity models for efficient privacy-preserving joins
-
M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin Formal anonymity models for efficient privacy-preserving joins Data & Knowledge Engineering 68 11 2009 1206 1223
-
(2009)
Data & Knowledge Engineering
, vol.68
, Issue.11
, pp. 1206-1223
-
-
Kantarcioglu, M.1
Inan, A.2
Jiang, W.3
Malin, B.4
-
16
-
-
71749116219
-
Accurate and large-scale privacy-preserving data mining using the election paradigm
-
E. Magkosa, M. Maragoudakisb, V. Chrissikopoulosa, and S. Gritzalis Accurate and large-scale privacy-preserving data mining using the election paradigm Data & Knowledge Engineering 68 11 2009 1224 1236
-
(2009)
Data & Knowledge Engineering
, vol.68
, Issue.11
, pp. 1224-1236
-
-
Magkosa, E.1
Maragoudakisb, M.2
Chrissikopoulosa, V.3
Gritzalis, S.4
-
17
-
-
33751023839
-
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
-
H. Yu, X. Jiang, and J. Vaidya Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data Proceedings of the 13th Annual Workshop on Selected Areas in Cryptography (SAC), Montreal, Quebec, Canada 2006 603 610
-
(2006)
Proceedings of the 13th Annual Workshop on Selected Areas in Cryptography (SAC), Montreal, Quebec, Canada
, pp. 603-610
-
-
Yu, H.1
Jiang, X.2
Vaidya, J.3
-
18
-
-
33749576809
-
Cryptographically private support vector machines
-
S. Laur, H. Lipmaa, and T. Mielikäinen Cryptographically private support vector machines Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, FL, USA 2006 618 624
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, FL, USA
, pp. 618-624
-
-
Laur, S.1
Lipmaa, H.2
Mielikäinen, T.3
-
19
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data & Knowledge Engineering 65 1 2008 5 21
-
(2008)
Data & Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
20
-
-
55149108163
-
Multiplicative noise for masking continuous data
-
Statistical Research Division, U.S. Bureau of the Census Washington DC, USA
-
J.J. Kim, and W.E. Winkler Multiplicative noise for masking continuous data Research Report Series (Statistics #2003-01) April 2003 Statistical Research Division, U.S. Bureau of the Census Washington DC, USA
-
(2003)
Research Report Series (Statistics #2003-01)
-
-
Kim, J.J.1
Winkler, W.E.2
-
21
-
-
35148885090
-
Cancelable biometrics realization with multispace random projections
-
A. Teoh, and C.T. Yuang Cancelable biometrics realization with multispace random projections IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics 37 5 2007 1096 1106
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.1
Yuang, C.T.2
-
22
-
-
41549109791
-
On static and dynamic methods for condensation-based privacy-preserving data mining
-
C.C. Aggarwal, and P.S. Yu On static and dynamic methods for condensation-based privacy-preserving data mining ACM Transactions on Database Systems (TODS) 33 1 2008 2:1 2:39
-
(2008)
ACM Transactions on Database Systems (TODS)
, vol.33
, Issue.1
, pp. 21-239
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
23
-
-
33745903481
-
Extreme learning machine: Theory and applications
-
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew Extreme learning machine: theory and applications Neurocomputing 70 1-3 2006 489 501 (selected Papers from the 7th Brazilian Symposium on Neural Networks (SBRN04))
-
(2006)
Neurocomputing
, vol.70
, Issue.13
, pp. 489-501
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
24
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.Y. Zhu Tools for privacy preserving distributed data mining ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD) 4 (2) 2003 28 34
-
(2003)
ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD)
, vol.42
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
26
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen On private scalar product computation for privacy-preserving data mining Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea 2004 104 120
-
(2004)
Proceedings of the 7th International Conference on Information Security and Cryptology (ICISC), Seoul, Korea
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
28
-
-
33750908650
-
A privacy-preserving protocol for neural-network-based computation
-
M. Barni, C. Orlandi, and A. Piva A privacy-preserving protocol for neural-network-based computation Proceeding of the 8th Workshop on Multimedia and Security, Geneva, Switzerland 2006 146 151
-
(2006)
Proceeding of the 8th Workshop on Multimedia and Security, Geneva, Switzerland
, pp. 146-151
-
-
Barni, M.1
Orlandi, C.2
Piva, A.3
-
30
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor, and B. Pinkas Oblivious transfer and polynomial evaluation Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing (STOC), New York, NY, USA 1999 245 254
-
(1999)
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing (STOC), New York, NY, USA
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
33
-
-
51749121564
-
A privacy preserving probabilistic neural network for horizontally partitioned databases
-
J. Secretan, M. Georgiopoulos, and J. Castro A privacy preserving probabilistic neural network for horizontally partitioned databases Proceedings of the International Joint Conference on Neural Networks (IJCNN), Orlando, FL, USA 2007 1554 1559
-
(2007)
Proceedings of the International Joint Conference on Neural Networks (IJCNN), Orlando, FL, USA
, pp. 1554-1559
-
-
Secretan, J.1
Georgiopoulos, M.2
Castro, J.3
-
36
-
-
70350460233
-
A privacy preserving neural network learning algorithm for horizontally partitioned databases
-
L. Guang, W. Ya-Dong, and S. Xiao-Hong A privacy preserving neural network learning algorithm for horizontally partitioned databases Information Technology Journal 9 1 2009 1 10
-
(2009)
Information Technology Journal
, vol.9
, Issue.1
, pp. 1-10
-
-
Guang, L.1
Ya-Dong, W.2
Xiao-Hong, S.3
-
38
-
-
36849062662
-
Privacy-preservation for gradient descent methods
-
ACM New York, NY, USA
-
L. Wan, W.K. Ng, S. Han, and V.C.S. Lee Privacy-preservation for gradient descent methods Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '07 2007 ACM New York, NY, USA 775 783
-
(2007)
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '07
, pp. 775-783
-
-
Wan, L.1
Ng, W.K.2
Han, S.3
Lee, V.C.S.4
-
39
-
-
70350345197
-
Privacy-preserving back propagation neural network learning
-
T. Chen, and S. Zhong Privacy-preserving back propagation neural network learning IEEE Transactions on Neural Networks 20 10 2009 1554 1564
-
(2009)
IEEE Transactions on Neural Networks
, vol.20
, Issue.10
, pp. 1554-1564
-
-
Chen, T.1
Zhong, S.2
-
40
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Springer-Verlag New York, Inc. New York, NY, USA
-
T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms Proceedings of CRYPTO 84 on Advances in cryptology 1985 Springer-Verlag New York, Inc. New York, NY, USA 10 18
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 10-18
-
-
Elgamal, T.1
-
41
-
-
79251640709
-
Privacy preserving back-propagation neural network learning over arbitrarily partitioned data
-
A. Bansal, T. Chen, and S. Zhong Privacy preserving back-propagation neural network learning over arbitrarily partitioned data Neural Computing and Applications 20 2011 143 150
-
(2011)
Neural Computing and Applications
, vol.20
, pp. 143-150
-
-
Bansal, A.1
Chen, T.2
Zhong, S.3
-
42
-
-
23844556499
-
Oblivious polynomial evaluation and oblivious neural learning
-
Y.-C. Chang, and C.-J. Lu Oblivious polynomial evaluation and oblivious neural learning Theoretical Computer Science 341 2005 39 54
-
(2005)
Theoretical Computer Science
, vol.341
, pp. 39-54
-
-
Chang, Y.-C.1
Lu, C.-J.2
-
47
-
-
0003538319
-
-
Plenum Press New York, London
-
J. Ortega Matrix Theory 1987 Plenum Press New York, London
-
(1987)
Matrix Theory
-
-
Ortega, J.1
-
48
-
-
70349614379
-
A new constructive algorithm for architectural and functional adaptation of artificial neural networks
-
M.M. Islam, M.A. Sattar, M.F. Amin, X. Yao, and K. Murase A new constructive algorithm for architectural and functional adaptation of artificial neural networks IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics 39 6 2009 1590 1605
-
(2009)
IEEE Transactions on Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.39
, Issue.6
, pp. 1590-1605
-
-
Islam, M.M.1
Sattar, M.A.2
Amin, M.F.3
Yao, X.4
Murase, K.5
-
50
-
-
33645593031
-
Foundations of cryptography
-
Cambridge University Press New York, NY, USA
-
O. Goldreich Foundations of cryptography Basic Applications vol. 2 2004 Cambridge University Press New York, NY, USA
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
52
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti Security and composition of multiparty cryptographic protocols Journal of Cryptology 13 1 2000 143 202
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
53
-
-
67649637295
-
Privacy-preserving singular value decomposition
-
IEEE Computer Society Washington, DC, USA
-
S. Han, W.K. Ng, and P.S. Yu Privacy-preserving singular value decomposition Proceedings of the 2009 IEEE International Conference on Data Engineering (ICDE) 2009 IEEE Computer Society Washington, DC, USA 1267 1270
-
(2009)
Proceedings of the 2009 IEEE International Conference on Data Engineering (ICDE)
, pp. 1267-1270
-
-
Han, S.1
Ng, W.K.2
Yu, P.S.3
-
54
-
-
79952087016
-
Suitable MLP network activation functions for breast cancer and thyroid disease detection
-
I. Isa, Z. Saad, S. Omar, M. Osman, K. Ahmad, and H. Sakim Suitable MLP network activation functions for breast cancer and thyroid disease detection Computational Intelligence, Modelling and Simulation (CIMSiM), 2010 Second International Conference on 2010 39 44
-
(2010)
Computational Intelligence, Modelling and Simulation (CIMSiM), 2010 Second International Conference on
, pp. 39-44
-
-
Isa, I.1
Saad, Z.2
Omar, S.3
Osman, M.4
Ahmad, K.5
Sakim, H.6
-
56
-
-
0001006209
-
Local computations with probabilities on graphical structures and their application to expert systems
-
S.L. Lauritzen, and D.J. Spiegelhalter Local computations with probabilities on graphical structures and their application to expert systems Journal of the Royal Statistical Society B 50 1988 157 194
-
(1988)
Journal of the Royal Statistical Society B
, vol.50
, pp. 157-194
-
-
Lauritzen, S.L.1
Spiegelhalter, D.J.2
-
58
-
-
0002460150
-
The alarm monitoring system: A case study with two probabilistic inference techniques for belief networks
-
I.A. Beinlich, H.J. Suermondt, R.M. Chavez, and G.F. Cooper The alarm monitoring system: a case study with two probabilistic inference techniques for belief networks Proceeding of the Second European Conf. on Artificial Intelligence in Medicine, vol. 38 1989 247 256
-
(1989)
Proceeding of the Second European Conf. on Artificial Intelligence in Medicine, Vol. 38
, pp. 247-256
-
-
Beinlich, I.A.1
Suermondt, H.J.2
Chavez, R.M.3
Cooper, G.F.4
|