-
2
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar On the privacy preserving properties of random data perturbation techniques Proc. IEEE ICDM 2003
-
(2003)
Proc. IEEE ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
3
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du, and B. Chen Deriving private information from randomized data Proc. ACM SIGMOD 2005 37 48
-
(2005)
Proc. ACM SIGMOD
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
4
-
-
56749173528
-
Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining
-
S. Guo, X. Wu, and Y. Li Determining error bounds for spectral filtering based reconstruction methods in privacy preserving data mining Knowledge and Information Systems 17 2 2008 217 240
-
(2008)
Knowledge and Information Systems
, vol.17
, Issue.2
, pp. 217-240
-
-
Guo, S.1
Wu, X.2
Li, Y.3
-
6
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N.R. Adam, and J.C. Worthmann Security-control methods for statistical databases: a comparative study ACM Computing Surveys 21 4 1989 515 556
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
7
-
-
33750283449
-
Privacy preserving data classification with rotation perturbation
-
K. Chen, and L. Liu Privacy preserving data classification with rotation perturbation Proc. IEEE ICDM 2005 589 592
-
(2005)
Proc. IEEE ICDM
, pp. 589-592
-
-
Chen, K.1
Liu, L.2
-
10
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
K. Liu, C. Giannella, and H. Kargupta An attacker's view of distance preserving maps for privacy preserving data mining Proc. PKDD 2006 297 308
-
(2006)
Proc. PKDD
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
11
-
-
36048948044
-
A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
-
S. Mukherjee, Z. Chen, and A. Gangopadhyay A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms The VLDB Journal 15 4 2006 293 315
-
(2006)
The VLDB Journal
, vol.15
, Issue.4
, pp. 293-315
-
-
Mukherjee, S.1
Chen, Z.2
Gangopadhyay, A.3
-
12
-
-
49049097752
-
Towards attack-resilient geometric data perturbation
-
K. Chen, G. Sun, and L. Liu Towards attack-resilient geometric data perturbation Proc. SIAM SDM 2007
-
(2007)
Proc. SIAM SDM
-
-
Chen, K.1
Sun, G.2
Liu, L.3
-
13
-
-
49049096931
-
Disclosure risks of distance preserving data transformations
-
Springer-Verlag
-
E. Turgay, T. Pedersen, Y. Saygin, E. Savas, and A. Levi Disclosure risks of distance preserving data transformations Lecture Notes in Computer Science vol. 5069 2008 Springer-Verlag 79 94
-
(2008)
Lecture Notes in Computer Science
, vol.5069
, pp. 79-94
-
-
Turgay, E.1
Pedersen, T.2
Saygin, Y.3
Savas, E.4
Levi, A.5
-
16
-
-
45249117455
-
A privacy preserving technique for distance-based classification with worst case privacy guarantees
-
S. Mukherjee, M. Banerjee, Z. Chen, and A. Gangopadhyay A privacy preserving technique for distance-based classification with worst case privacy guarantees Data & Knowledge Engineering 66 2 2008 264 288
-
(2008)
Data & Knowledge Engineering
, vol.66
, Issue.2
, pp. 264-288
-
-
Mukherjee, S.1
Banerjee, M.2
Chen, Z.3
Gangopadhyay, A.4
-
17
-
-
0003684449
-
-
2nd edition Springer (Ch. 13.3, 5th printing)
-
T. Hastie, R. Tibshirani, and J. Friedman The Elements of Statistical Learning: Data Mining, Inference, and Prediction 2nd edition 2011 Springer (Ch. 13.3, 5th printing)
-
(2011)
The Elements of Statistical Learning: Data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
19
-
-
39749182452
-
The applicability of the perturbation based privacy preserving data mining for real-world data
-
L. Liu, M. Kantarcioglu, and B. Thuraisingham The applicability of the perturbation based privacy preserving data mining for real-world data Data & Knowledge Engineering 65 1 2008 5 21
-
(2008)
Data & Knowledge Engineering
, vol.65
, Issue.1
, pp. 5-21
-
-
Liu, L.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
20
-
-
55149108163
-
Multiplicative noise for masking continuous data
-
Statistical Research Division, U.S. Bureau of the Census Washington D.C. (April)
-
J.J. Kim, and W.E. Winkler Multiplicative noise for masking continuous data Tech. Rep. Statistics #2003-01 2003 Statistical Research Division, U.S. Bureau of the Census Washington D.C. (April)
-
(2003)
Tech. Rep. Statistics #2003-01
-
-
Kim, J.J.1
Winkler, W.E.2
-
26
-
-
57149136993
-
Privacy-preserving data mining: Models and algorithms
-
1st edition Springer (Ch. 5)
-
C.C. Aggarwal, and P.S. Yu Privacy-preserving data mining: models and algorithms Advances in Database Systems 1st edition 2008 Springer (Ch. 5)
-
(2008)
Advances in Database Systems
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
27
-
-
35048841248
-
A condensation based approach to privacy preserving data mining
-
C.C. Aggarwal, and P.S. Yu A condensation based approach to privacy preserving data mining Proc. EDBT 2004 183 199
-
(2004)
Proc. EDBT
, pp. 183-199
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
28
-
-
33746873290
-
A tree-based data perturbation approach for privacy-preserving data mining
-
X.-B. Li, and S. Sarkar A tree-based data perturbation approach for privacy-preserving data mining IEEE Transactions on Knowledge and Data Engineering 18 9 2006 1278 1283
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.9
, pp. 1278-1283
-
-
Li, X.-B.1
Sarkar, S.2
-
30
-
-
33646367179
-
Data shuffling - A new masking approach for numeric data
-
K. Muralidhar, and R. Sarathy Data shuffling - a new masking approach for numeric data Management Science 52 5 2006 658 670
-
(2006)
Management Science
, vol.52
, Issue.5
, pp. 658-670
-
-
Muralidhar, K.1
Sarathy, R.2
-
31
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
S.J. Rizvi, and J.R. Haritsa Maintaining data privacy in association rule mining Proc. VLDB 2002
-
(2002)
Proc. VLDB
-
-
Rizvi, S.J.1
Haritsa, J.R.2
-
32
-
-
2142754478
-
Association rule hiding
-
V.S. Verykios, A.K. Elmagarmid, B. Elisa, Y. Saygin, and D. Elena Association rule hiding IEEE Transactions on Knowledge and Data Engineering vol. 16 2004 434 447
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Elisa, B.3
Saygin, Y.4
Elena, D.5
-
34
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
(14:1-14:53)
-
B. Fung, K. Wang, R. Chen, and P. Yu Privacy-preserving data publishing: a survey of recent developments ACM Computing Surveys 42 4 2010 (14:1-14:53)
-
(2010)
ACM Computing Surveys
, vol.42
, Issue.4
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.4
-
35
-
-
77955265259
-
Discovering private trajectories using background information
-
E. Kaplan, T. Pedersen, E. Savas, and Y. Saygin Discovering private trajectories using background information Data & Knowledge Engineering 69 7 2010 723 736
-
(2010)
Data & Knowledge Engineering
, vol.69
, Issue.7
, pp. 723-736
-
-
Kaplan, E.1
Pedersen, T.2
Savas, E.3
Saygin, Y.4
-
36
-
-
0042826822
-
Independent component analysis: Algorithms and applications
-
A. Hyvärinen, and E. Oja Independent component analysis: algorithms and applications Neural Networks 13 4 2000 411 430
-
(2000)
Neural Networks
, vol.13
, Issue.4
, pp. 411-430
-
-
Hyvärinen, A.1
Oja, E.2
-
37
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
K. Liu, H. Kargupta, and J. Ryan Random projection-based multiplicative data perturbation for privacy preserving distributed data mining IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
38
-
-
38049109087
-
Deriving private information from arbitrarily projected data
-
S. Guo, and X. Wu Deriving private information from arbitrarily projected data Proc. PAKDD 2007
-
(2007)
Proc. PAKDD
-
-
Guo, S.1
Wu, X.2
-
39
-
-
0003956968
-
-
Prentice Hall
-
M. Artin Algebra 1991 Prentice Hall
-
(1991)
Algebra
-
-
Artin, M.1
-
40
-
-
0003449348
-
-
3rd ed. Harcourt Brace Jovanovich College Publishers New York
-
G. Strang Linear Algebra and Its Applications 3rd ed. 1986 Harcourt Brace Jovanovich College Publishers New York
-
(1986)
Linear Algebra and Its Applications
-
-
Strang, G.1
-
41
-
-
0001189848
-
Algorithm as 127: Generation of random orthogonal matrices
-
R. Heiberger Algorithm as 127: generation of random orthogonal matrices Applied Statistics 27 2 1978 199 206
-
(1978)
Applied Statistics
, vol.27
, Issue.2
, pp. 199-206
-
-
Heiberger, R.1
|