-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
In, Santa Barbara, Cahfornia, May 21-23 ACM
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the Twentieth ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems, pages 247-255, Santa Barbara, Cahfornia, May 21-23 2001. ACM.
-
(2001)
Proceedings of the Twentieth ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
1142303699
-
Information sharing across private databases
-
In, San Diego, California, June 9-12
-
R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases. In Proceedings of ACM SIGMOD International Conference on Management of Data, San Diego, California, June 9-12 2003.
-
(2003)
Proceedings of ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
3
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
In P. Buneman and S. Jajodia, editors, Washington, D.C., May 26-28
-
R. Agrawal, T. Imiehnski, and A. N. Swami. Mining association rules between sets of items in large databases. In P. Buneman and S. Jajodia, editors. Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pages 207-216, Washington, D.C., May 26-28 1993.
-
(1993)
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imiehnski, T.2
Swami, A.N.3
-
4
-
-
0041783510
-
Privacy-preserving data mining
-
In, Dallas, TX, May 14-19 ACM
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pages 439-450, Dallas, TX, May 14-19 2000. ACM.
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
5
-
-
85032400475
-
Disclosure limitation of sensitive rules
-
In, Chicago, Illinois, Nov. 8
-
M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. Verykios. Disclosure limitation of sensitive rules. In Knowledge and Data Engineering Exchange Workshop (KDEX'99), pages 25-32, Chicago, Illinois, Nov. 8 1999.
-
(1999)
Knowledge and Data Engineering Exchange Workshop (KDEX'99)
, pp. 25-32
-
-
Atallah, M.1
Bertino, E.2
Elmagarmid, A.3
Ibrahim, M.4
Verykios, V.5
-
6
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
In, Washington, DC, Oct. 28
-
M. J. Atallah, M, Bykova, J. Li, and M. Karahan. Private collaborative forecasting and benchmarking. In Proc. 2d. ACM Workshop on Privacy in the Electronic Society (WPES), Washington, DC, Oct. 28 2004.
-
(2004)
Proc. 2d. ACM Workshop on Privacy in the Electronic Society (WPES)
-
-
Atallah, M.J.1
Bykova, M.2
Li, J.3
Karahan, M.4
-
7
-
-
77954694081
-
Secure supply-chain protocols
-
In, Newport Beach, Cahfornia, June 24-27
-
M. J. Atallah, H. G. Elmongui, V. Deshpande, and L. B. Schwarz. Secure supply-chain protocols. In IEEE International Conference on E-Commerce, pages 293-302, Newport Beach, Cahfornia, June 24-27 2003.
-
(2003)
IEEE International Conference on E-Commerce
, pp. 293-302
-
-
Atallah, M.J.1
Elmongui, H.G.2
Deshpande, V.3
Schwarz, L.B.4
-
8
-
-
19544361825
-
Detecting novel network intrusions using bayes estimators
-
In, Chicago, Illinois, Apr. 5-7
-
D. Barbara, N. Wu, and S. Jajodia. Detecting novel network intrusions using bayes estimators. In First SIAM International Conference on Data Mining, Chicago, Illinois, Apr. 5-7 2001.
-
(2001)
First SIAM International Conference on Data Mining
-
-
Barbara, D.1
Wu, N.2
Jajodia, S.3
-
11
-
-
0033280866
-
EflBcient private bidding and auctions with an oblivious third party
-
In, Kent Ridge Digital Labs, Singapore, ACM Press
-
C. Cachin. EflBcient private bidding and auctions with an oblivious third party. In Proceedings of the 6th ACM conference on Computer and communications security, pages 120-127, Kent Ridge Digital Labs, Singapore, 1999. ACM Press.
-
(1999)
Proceedings of the 6th ACM conference on Computer and communications security
, pp. 120-127
-
-
Cachin, C.1
-
12
-
-
33745547205
-
Toward privacy in public databases
-
In, Cambridge, MA, Feb. 9-12
-
S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Toward privacy in public databases. In Theory of Cryptography Conference, Cambridge, MA, Feb. 9-12 2005.
-
(2005)
Theory of Cryptography Conference
-
-
Chawla, S.1
Dwork, C.2
McSherry, F.3
Smith, A.4
Wee, H.5
-
13
-
-
0030387678
-
A fast distributed algorithm for mining association rules
-
In, Miami Beach, Florida, USA, Dec. IEEE
-
D. W.-L. Cheung, J. Han, V. Ng, A. W.-C. Fu, and Y. Fu. A fast distributed algorithm for mining association rules. In Proceedings of the 1996 International Conference on Parallel and Distributed Information Systems (PDIS'96), pages 31-42, Miami Beach, Florida, USA, Dec. 1996. IEEE.
-
(1996)
Proceedings of the 1996 International Conference on Parallel and Distributed Information Systems (PDIS'96)
, pp. 31-42
-
-
Cheung, D.W.-L.1
Han, J.2
Ng, V.3
Fu, A.W.-C.4
Fu, Y.5
-
14
-
-
26444568172
-
Secrecy of twoparty secure computation
-
In, Storrs, Connecticut, Aug. 7-10
-
Y.-T. Chiang, D.-W. Wang, C.-J. Liau, and T. Sheng Hsu. Secrecy of twoparty secure computation. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 114-123, Storrs, Connecticut, Aug. 7-10 2005.
-
(2005)
Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 114-123
-
-
Chiang, Y.-T.1
Wang, D.-W.2
Liau, C.-J.3
Sheng Hsu, T.4
-
15
-
-
26444575051
-
Defining privacy for data mining
-
In H. Kargupta, A. Joshi, and K. Sivakumar, editors, Baltimore, MD, Nov. 1-3
-
C. Clifton, M. Kantarcioglu, and J. Vaidya. Defining privacy for data mining. In H. Kargupta, A. Joshi, and K. Sivakumar, editors. National Science Foundation Workshop on Next Generation Data Mining, pages 126 133. Baltimore, MD, Nov. 1-3 2002.
-
(2002)
National Science Foundation Workshop on Next Generation Data Mining
, pp. 126-133
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
16
-
-
34249832377
-
A bayesian method for the induction of probabilistic networks from data
-
G. Cooper and E. Herskovits. A bayesian method for the induction of probabilistic networks from data. Machine Learning, 9(4):309-347, 1992.
-
(1992)
Machine Learning
, vol.9
, Issue.4
, pp. 309-347
-
-
Cooper, G.1
Herskovits, E.2
-
18
-
-
0034710980
-
Bounds for cell entries in contingency tables given marginal totals and decomposable graphs
-
In
-
A. Dobra and S. E. Fienberg. Bounds for cell entries in contingency tables given marginal totals and decomposable graphs. In Proceedings of the National Academy of Sciences, number 97, pages 11885-11892, 2000.
-
(2000)
Proceedings of the National Academy of Sciences
, Issue.97
, pp. 11885-11892
-
-
Dobra, A.1
Fienberg, S.E.2
-
19
-
-
0004115628
-
-
editors., Elsevier, Amsterdam, Holland
-
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz, editors. Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies. Elsevier, Amsterdam, Holland, 2001.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
-
-
Doyle, P.1
Lane, J.2
Theeuwes, J.3
Zayatz, L.4
-
20
-
-
84927517111
-
Privacy-preserving statistical analysis
-
In, New Orleans, Louisiana, USA, December 10-14
-
W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14 2001.
-
(2001)
Proceeding of the 17th Annual Computer Security Applications Conference
-
-
Du, W.1
Atallah, M.J.2
-
21
-
-
33645584057
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
In, Lake Buena Vista, Florida, Apr. 22-24
-
W. Du, Y. S. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In 2004 SI AM International Conference on Data Mining, Lake Buena Vista, Florida, Apr. 22-24 2004.
-
(2004)
2004 SI AM International Conference on Data Mining
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
22
-
-
1642302606
-
Building decision tree classifier on private data
-
In C. Clifton and V. Estivill-Castro, editors, volume 14, Maebashi City, Japan, Dec. 9 AustraUan Computer Society
-
W. Du and Z. Zhan. Building decision tree classifier on private data. In C. Clifton and V. Estivill-Castro, editors, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, volume 14, pages 1-8, Maebashi City, Japan, Dec. 9 2002. AustraUan Computer Society.
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
23
-
-
77952334884
-
Using randomized response techniques for privacypreserving data mining
-
In, Washington, DC, Aug. 24-27
-
W. Du and Z. Zhan. Using randomized response techniques for privacypreserving data mining. In The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 505-510, Washington, DC, Aug. 24-27 2003.
-
(2003)
The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
26
-
-
0003187764
-
-
Directive 95/46/EC of the European ParHament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data., Oct. 24
-
Directive 95/46/EC of the European ParHament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, No I.(281):31-50, Oct. 24 1995.
-
(1995)
Official Journal of the European Communities
, vol.1
, Issue.281
, pp. 31-50
-
-
-
27
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
In, San Diego, CA, June 9-12
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In Proceedings of the 22nd ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems (PODS 2003), pages 211-222, San Diego, CA, June 9-12 2003.
-
(2003)
Proceedings of the 22nd ACM SIGACT-SIGMODSIGART Symposium on Principles of Database Systems (PODS 2003)
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
28
-
-
0242625281
-
Privacy preserving mining of association rules
-
In, Edmonton, Alberta, Canada, July 23-26
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke. Privacy preserving mining of association rules. In The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 217-228, Edmonton, Alberta, Canada, July 23-26 2002.
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
29
-
-
0030270830
-
Constructing bayesian networks to predict uncollectible telecommunications accounts
-
Oct
-
K. J. Ezawa and S. W. Norton. Constructing bayesian networks to predict uncollectible telecommunications accounts. IEEE Expert, 11(5):45-51, Oct. 1996.
-
(1996)
IEEE Expert
, vol.11
, Issue.5
, pp. 45-51
-
-
Ezawa, K.J.1
Norton, S.W.2
-
30
-
-
84882664371
-
-
Falcon fraud managerEA. http://www.fairisaac.com/Fairisaac/Solutions/Solutions+by+Function/Falcon+Fraud+Mcinager. htm, 2005.
-
(2005)
Falcon fraud managerEA
-
-
-
33
-
-
12244263240
-
Efficient private matching and set intersection
-
In, Interlaken, Switzerland, May 2-6 International Association for Cryptologic Research (lACR)
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Eurocrypt 2004, Interlaken, Switzerland, May 2-6 2004. International Association for Cryptologic Research (lACR).
-
(2004)
Eurocrypt 2004
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
35
-
-
24944523186
-
On Secure Scalar Product Computation for Privacy-Preserving Data Mining
-
In C. Park and S. Ghee, editors, December 2-3
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On Secure Scalar Product Computation for Privacy-Preserving Data Mining. In C. Park and S. Ghee, editors. The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506, pages 104-120, December 2-3, 2004.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
36
-
-
0003979335
-
-
chapter General Cryptographic Protocols. Cambridge University Press
-
O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
38
-
-
0005063385
-
Onion routing
-
Feb
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Commun. ACM, 42(2):39-41, Feb. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
40
-
-
0037077422
-
Standard for privacy of individually identifiable health information
-
Aug. 14
-
Standard for privacy of individually identifiable health information. Federal Register, 67(157):53181-53273, Aug. 14 2002.
-
(2002)
Federal Register
, vol.67
, Issue.157
, pp. 53181-53273
-
-
-
41
-
-
0003895755
-
-
Technical report, U.S. Department of Health and Human Services Office for Civil Rights, Aug
-
Standard for privacy of individually identifiable health information. Technical report, U.S. Department of Health and Human Services Office for Civil Rights, Aug. 2003.
-
(2003)
Standard for privacy of individually identifiable health information
-
-
-
42
-
-
29844458622
-
Deriving private information from randomized data
-
In, Baltimore, MD, June 13-16
-
Z. Huang, W. Du, and B. Chen. Deriving private information from randomized data. In Proceedings of the 2005 ACM SICMOD International Conference on Management of Data, Baltimore, MD, June 13-16 2005.
-
(2005)
Proceedings of the 2005 ACM SICMOD International Conference on Management of Data
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
43
-
-
84948451182
-
A secure protocol for computing dotproducts in clustered and distributed environments
-
In, Vancouver, British Columbia, Aug. 18-21
-
I. loannidis, A. Grama, and M. Atallah. A secure protocol for computing dotproducts in clustered and distributed environments. In The 2002 International Conference on Parallel Processing, Vancouver, British Columbia, Aug. 18-21 2002.
-
(2002)
The 2002 International Conference on Parallel Processing
-
-
Loannidis, I.1
Grama, A.2
Atallah, M.3
-
44
-
-
32344446366
-
Privacy-preserving distributed/c-means clustering over arbitrarily partitioned data
-
In, Chicago, IL, Aug. 21-24
-
G. Jagannathan and R. N. Wright. Privacy-preserving distributed/c-means clustering over arbitrarily partitioned data. In Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 593-599, Chicago, IL, Aug. 21-24 2005.
-
(2005)
Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 593-599
-
-
Jagannathan, G.1
Wright, R.N.2
-
46
-
-
1142282764
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
In, Madison, Wisconsin, June 2
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. In The A CM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02), pages 24-31, Madison, Wisconsin, June 2 2002.
-
(2002)
The A CM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02)
, pp. 24-31
-
-
Kantarcioglu, M.1
Clifton, C.2
-
47
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Sept
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge Data Eng., 16(9):1026-1037, Sept. 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
48
-
-
12244296735
-
When do data mining results violate privacy?
-
In, Seattle, WA, Aug. 22-25
-
M. Kantarcioglu, J. Jin, and C. Clifton. When do data mining results violate privacy? In Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pe. ges 599-604, Seattle, WA, Aug. 22-25 2004.
-
(2004)
Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
49
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
In, Melbourne, Florida, Nov. 19-22
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, Florida, Nov. 19-22 2003.
-
(2003)
Proceedings of the Third IEEE International Conference on Data Mining (ICDM'03)
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
50
-
-
20744460179
-
Secure regressions on distributed databases
-
A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter. Secure regressions on distributed databases. Journal of Computational and Graphical Statistics, 14:263-279, 2005.
-
(2005)
Journal of Computational and Graphical Statistics
, vol.14
, pp. 263-279
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
51
-
-
0002948319
-
Algorithms for mining distance-based outliers in large datasets
-
In, New York City, NY, USA, Aug.24-27
-
E. M. Knorr and R. T. Ng. Algorithms for mining distance-based outliers in large datasets. In Proceedings of 24th International Conference on Very Large Data Bases (VLDB 1998), pages 392-403, New York City, NY, USA, Aug.24-27 1998.
-
(1998)
Proceedings of 24th International Conference on Very Large Data Bases (VLDB 1998)
, pp. 392-403
-
-
Knorr, E.M.1
Ng, R.T.2
-
52
-
-
0034133513
-
Distance-based outliers: Algorithms and apphcations
-
E. M. Knorr, R. T. Ng, and V. Tucakov. Distance-based outliers: algorithms and apphcations. The VLDB Journal, 8(3-4):237-253, 2000.
-
(2000)
The VLDB Journal
, vol.8
, Issue.3-4
, pp. 237-253
-
-
Knorr, E.M.1
Ng, R.T.2
Tucakov, V.3
-
53
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
In, San Francisco, California, May 1-3
-
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar. A comparative study of anomaly detection schemes in network intrusion detection. In SI AM International Conference on Data Mining (2003), San Francisco, California, May 1-3 2003.
-
(2003)
SI AM International Conference on Data Mining (2003)
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
54
-
-
77954004564
-
-
July 17 2003, 8120, Title VIII section. Enacted as Pubhc Law 108-87
-
M. Lewis. Department of defense appropriations act, 2004, July 17 2003. Title VIII section 8120. Enacted as Pubhc Law 108-87.
-
(2004)
Department of defense appropriations act
-
-
Lewis, M.1
-
55
-
-
12244313201
-
Privacy preserving clustering with distributed EM mixture modeling
-
to appear
-
X. Lin, C. Clifton, and M. Zhu. Privacy preserving clustering with distributed EM mixture modeling. Knowledge and Information Systems, to appear 2004.
-
(2004)
Knowledge and Information Systems
-
-
Lin, X.1
Clifton, C.2
Zhu, M.3
-
56
-
-
84974555530
-
Privacy preserving data mining
-
In,. Springer-Verlag, Aug. 20-24
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology-CRYPTO 2000, pages 36-54. Springer-Verlag, Aug. 20-24 2000.
-
(2000)
Advances in Cryptology-CRYPTO 2000
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
57
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
59
-
-
0004255908
-
-
McGraw-Hill Science/Engineering/Math, 1st edition
-
T. Mitchell. Machine Learning. McGraw-Hill Science/Engineering/Math, 1st edition, 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.1
-
61
-
-
0032218237
-
A new pubHc key cryptosystem based on higher residues
-
In, San Francisco, California, United States, ACM Press
-
D. Naccache and J. Stern. A new pubHc key cryptosystem based on higher residues. In Proceedings of the 5th ACM conference on Computer and communications security, pages 59-66, San Francisco, California, United States, 1998. ACM Press.
-
(1998)
Proceedings of the 5th ACM conference on Computer and communications security
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
62
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
In, Atlanta, Georgia, United States, ACM Press
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In Proceedings of the Thirty-first Annual ACM Symposium on Theory of Computing pages 245-254, Atlanta, Georgia, United States, 1999. ACM Press.
-
(1999)
Proceedings of the Thirty-first Annual ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
63
-
-
0004254507
-
-
McGraw-Hill/Irwin, 3rd edition
-
J. Neter, M. H. Kutner, W. Wasserman, and C. J. Nachtsheim. Applied Linear Regression Models. McGraw-Hill/Irwin, 3rd edition, 1996.
-
(1996)
Applied Linear Regression Models
-
-
Neter, J.1
Kutner, M.H.2
Wasserman, W.3
Nachtsheim, C.J.4
-
66
-
-
35048899833
-
Achieving privacy preservation when sharing data for clustering
-
In, Toronto, Canada, Aug. 30
-
S. R. M. Oliveira and O. R. Zaiane. Achieving privacy preservation when sharing data for clustering. In Workshop on Secure Data Management in a Connected World (SDM'04) in conjunction with VLDB'2004, pages 67-82, Toronto, Canada, Aug. 30 2004.
-
(2004)
Workshop on Secure Data Management in a Connected World (SDM'04) in conjunction with VLDB'2004
, pp. 67-82
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
67
-
-
28844447994
-
Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation
-
In, Brighton, UK, Nov. 1
-
S. R. M. Oliveira and O. R. Zaiane. Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation. In Workshop on Privacy and Security Aspects of Data Mining (PSDM'04) in conjunction with the Fourth IEEE International Conference on Data Mining (ICDM'04), pages 21-30, Brighton, UK, Nov. 1 2004.
-
(2004)
Workshop on Privacy and Security Aspects of Data Mining (PSDM'04) in conjunction with the Fourth IEEE International Conference on Data Mining (ICDM'04)
, pp. 21-30
-
-
Oliveira, S.R.M.1
Zaiane, O.R.2
-
68
-
-
84942550998
-
PubHc key cryptosystems based on composite degree residuosity classes
-
In,. Springer-Verlag
-
P. Paillier. PubHc key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592
, pp. 223-238
-
-
Paillier, P.1
-
69
-
-
0041294393
-
Believe in yourself, believe in the merchandise
-
Sept.8
-
C. Palmeri. Believe in yourself, believe in the merchandise. Forbes Magazine, 160(5):118-124, Sept.8 1997.
-
(1997)
Forbes Magazine
, vol.160
, Issue.5
, pp. 118-124
-
-
Palmeri, C.1
-
70
-
-
0001820920
-
X-means: Extending k-means with efficient estimation of the number of clusters
-
In, San Francisco, Morgan Kaufmann
-
D. Pelleg and A. Moore. X-means: Extending k-means with efficient estimation of the number of clusters. In Proceedings of the Seventeenth International Conference on Machine Learning, pages 727-734, San Francisco, 2000. Morgan Kaufmann.
-
(2000)
Proceedings of the Seventeenth International Conference on Machine Learning
, pp. 727-734
-
-
Pelleg, D.1
Moore, A.2
-
71
-
-
84882565877
-
-
July 21., perry, president and ceo, cardsystems solutions, inc. before the united states house of representatives subcommittee on oversight and investigations of the committee on financial services
-
J. M. Perry. Statement of John m. perry, president and ceo, cardsystems solutions, inc. before the united states house of representatives subcommittee on oversight and investigations of the committee on financial services. http://f inancialservices. house. gov/hearings. asp?f orinmode= detail&hearing=407&comm=4, July 21 2005.
-
(2005)
Statement of John m
-
-
Perry, J.M.1
-
72
-
-
33744584654
-
Induction of decision trees
-
J. R. Quinlan. Induction of decision trees. Machine Learning, 1(1):81-106, 1986.
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
73
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
In, Dallas, Texas, United States, ACM Press
-
S. Rametswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pages 427-438, Dallas, Texas, United States, 2000. ACM Press.
-
(2000)
Proceedings of the 2000 ACM SIGMOD international conference on Management of data
, pp. 427-438
-
-
Rametswamy, S.1
Rastogi, R.2
Shim, K.3
-
76
-
-
0035517699
-
Protecting respondent's privacy in microdata release
-
Nov./Dec
-
P. Samarati. Protecting respondent's privacy in microdata release. IEEE Trans. Knowledge Data Eng., 13(6): 1010-1027, Nov./Dec. 2001.
-
(2001)
IEEE Trans. Knowledge Data Eng
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
77
-
-
12244286332
-
Privacy preserving regression modelling via distributed computation
-
In, New York, NY, USA, ACM Press
-
A. P. Sanil, A. F. Karr, X. Lin, and J. P. Reiter. Privacy preserving regression modelling via distributed computation. In KDD '04-Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 677-682, New York, NY, USA, 2004. ACM Press.
-
(2004)
KDD '04-Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 677-682
-
-
Sanil, A.P.1
Karr, A.F.2
Lin, X.3
Reiter, J.P.4
-
78
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Dec
-
Y. Saygm, V. S. Verykios, and C. Clifton. Using unknowns to prevent discovery of association rules. SIGMOD Record, 30(4):45-54, Dec. 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygm, Y.1
Verykios, V.S.2
Clifton, C.3
-
80
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
In, Edmonton, Alberta, Canada, July 23-26
-
J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 639-644, Edmonton, Alberta, Canada, July 23-26 2002.
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
81
-
-
77952332120
-
Privacy-preserving/c-means clustering over vertically partitioned data
-
In, Washington, DC, Aug. 24-27
-
J. Vaidya and C. Clifton. Privacy-preserving/c-means clustering over vertically partitioned data. In The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 206-215, Washington, DC, Aug. 24-27 2003.
-
(2003)
The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
82
-
-
2942536415
-
Privacy preserving naiVe bayes classifier for vertically partitioned data
-
In, Lake Buena Vista, Florida, Apr. 22-24
-
J. Vaidya and C. Clifton. Privacy preserving naiVe bayes classifier for vertically partitioned data. In 2004 SLAM International Conference on Data Mining, pages 522-526, Lake Buena Vista, Florida, Apr. 22-24 2004.
-
(2004)
2004 SLAM International Conference on Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
84
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Nov
-
J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4), Nov. 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
-
-
Vaidya, J.1
Clifton, C.2
-
85
-
-
2142754478
-
Association rule hiding
-
V. S. Verykios, A. K. Elmagarmid, B. Elisa, Y. Saygin, and D. Elana. Association rule hiding. IEEE Trans. Knowledge Data Eng., 16(4), 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng
, vol.16
, Issue.4
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Elisa, B.3
Saygin, Y.4
Elana, D.5
-
86
-
-
27844580738
-
Cardinality-based inference control in data cubes
-
L. Wang, D. Wijesekera, and S. Jajodia. Cardinality-based inference control in data cubes. Journal of Computer Security, 12(5):655-692, 2005.
-
(2005)
Journal of Computer Security
, vol.12
, Issue.5
, pp. 655-692
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
87
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
Mar
-
S. L. Warner. Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, Mar. 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
91
-
-
38649118390
-
A new scheme on privacy-preserving association rule mining
-
In, Pisa, Italy, Sept. 20-24
-
N. Zhang, S. Wang, and W. Zhao. A new scheme on privacy-preserving association rule mining. In The 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2004), Pisa, Italy, Sept. 20-24 2004.
-
(2004)
The 8th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2004)
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
-
92
-
-
12244268919
-
Optimal randomization for privacy preserving data mining
-
In, New York, NY, USA, ACM Press
-
Y. Zhu and L. Liu. Optimal randomization for privacy preserving data mining. In KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 761-766, New York, NY, USA, 2004. ACM Press.
-
(2004)
KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 761-766
-
-
Zhu, Y.1
Liu, L.2
|