-
2
-
-
0003582713
-
-
Cambridge, Mass, USA MIT Press
-
Cranor L. F., Reagle J., Ackerman M. S., Beyond Concern: Understanding Net Users' Attitudes about Online Privacy 2000 Cambridge, Mass, USA MIT Press
-
(2000)
Beyond Concern: Understanding Net Users' Attitudes about Online Privacy
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
3
-
-
84861621894
-
Mining association rules under privacy constraints
-
New York, NY, USA Springer
-
Haritsa J. R., Mining association rules under privacy constraints. Privacy-Preserving Data Mining 2008 New York, NY, USA Springer 239 266
-
(2008)
Privacy-Preserving Data Mining
, pp. 239-266
-
-
Haritsa, J.R.1
-
5
-
-
77956224773
-
Optimal random perturbation at multiple privacy levels
-
Xiao X., Tao Y., Chen M., Optimal random perturbation at multiple privacy levels. Proceedings of the VLDB Endowment 2009 2 1 814 825
-
(2009)
Proceedings of the VLDB Endowment
, vol.2
, Issue.1
, pp. 814-825
-
-
Xiao, X.1
Tao, Y.2
Chen, M.3
-
6
-
-
11144317669
-
Randomized response techniques for multiple sensitive attributes
-
10.1080/01621459.1981.10477741
-
Tamhane A. C., Randomized response techniques for multiple sensitive attributes. Journal of the American Statistical Association 1981 76 376 916 923 10.1080/01621459.1981.10477741
-
(1981)
Journal of the American Statistical Association
, vol.76
, Issue.376
, pp. 916-923
-
-
Tamhane, A.C.1
-
8
-
-
79960571030
-
A survey of association rule hiding methods for privacy
-
New York, NY, USA Springer
-
Verykios V. S., Gkoulalas-Divanis A., A survey of association rule hiding methods for privacy. Privacy-Preserving Data Mining 2008 New York, NY, USA Springer 267 289
-
(2008)
Privacy-Preserving Data Mining
, pp. 267-289
-
-
Verykios, V.S.1
Gkoulalas-Divanis, A.2
-
9
-
-
33845625238
-
Hiding sensitive association rules with limited side effects
-
2-s2.0-33845625238 10.1109/TKDE.2007.250583
-
Wu Y.-H., Chiang C.-M., Chen A. L. P., Hiding sensitive association rules with limited side effects. IEEE Transactions on Knowledge and Data Engineering 2007 19 1 29 42 2-s2.0-33845625238 10.1109/TKDE.2007.250583
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.1
, pp. 29-42
-
-
Wu, Y.-H.1
Chiang, C.-M.2
Chen, A.L.P.3
-
10
-
-
84880954718
-
An experimental study of distortion-based techniques for association rule hiding
-
Springer IFIP International Federation for Information Processing 10.1007/1-4020-8128-6-22
-
Pontikakis E. D., Tsitsonis A. A., Verykios V. S., An experimental study of distortion-based techniques for association rule hiding. Research Directions in Data and Applications Security XVIII 2004 144 Springer 325 339 IFIP International Federation for Information Processing 10.1007/1-4020-8128-6-22
-
(2004)
Research Directions in Data and Applications Security XVIII
, vol.144
, pp. 325-339
-
-
Pontikakis, E.D.1
Tsitsonis, A.A.2
Verykios, V.S.3
-
11
-
-
20444468588
-
A quantitative and qualitative analysis of blocking in association rule hiding
-
Pontikakis E. D., Theodoridis Y., Tsitsonis A. A., Chang L., Verykios V. S., A quantitative and qualitative analysis of blocking in association rule hiding. Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES '04) October 2004 Washington, DC, USA ACM Press 29 30 2-s2.0-20444468588
-
Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES '04) October 2004 Washington, DC, USA ACM Press 2-s2.0-20444468588
, pp. 29-30
-
-
Pontikakis, E.D.1
Theodoridis, Y.2
Tsitsonis, A.A.3
Chang, L.4
Verykios, V.S.5
-
13
-
-
34548591826
-
A border-based approach for hiding sensitive frequent itemsets
-
November 2005 Houston, Tex, USA IEEE 2-s2.0-34548591826 10.1109/ICDM.2005.2
-
Xingzhi S., Yu P. S., A border-based approach for hiding sensitive frequent itemsets. Proceedings of the 5th IEEE International Conference on Data Mining (ICDM '05) November 2005 Houston, Tex, USA IEEE 426 433 2-s2.0-34548591826 10.1109/ICDM.2005.2
-
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM '05)
, pp. 426-433
-
-
Xingzhi, S.1
Yu, P.S.2
-
15
-
-
25844456648
-
Maximizing accuracy of shared databases when concealing sensitive patterns
-
2-s2.0-25844456648 10.1287/isre.1050.0056
-
Menon S., Sarkar S., Mukherjee S., Maximizing accuracy of shared databases when concealing sensitive patterns. Information Systems Research 2005 16 3 256 270 2-s2.0-25844456648 10.1287/isre.1050.0056
-
(2005)
Information Systems Research
, vol.16
, Issue.3
, pp. 256-270
-
-
Menon, S.1
Sarkar, S.2
Mukherjee, S.3
-
18
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
2-s2.0-4544361334 10.1109/TKDE.2004.45
-
Kantarcioglu M., Clifton C., Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 2004 16 9 1026 1037 2-s2.0-4544361334 10.1109/TKDE.2004.45
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
19
-
-
35048843897
-
A new scheme on privacy preserving association rule mining
-
Lecture Notes in Computer Science 2-s2.0-35048843897 10.1007/978-3-540- 30116-5-44
-
Zhang N., Wang S., Zhao W., A new scheme on privacy preserving association rule mining. Knowledge Discovery in Databases: PKDD 2004 2004 3202 484 495 Lecture Notes in Computer Science 2-s2.0-35048843897 10.1007/978-3-540-30116-5-44
-
(2004)
Knowledge Discovery in Databases: PKDD 2004
, vol.3202
, pp. 484-495
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
-
20
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
2-s2.0-0013776710
-
Warner S. L., Randomized response: a survey technique for eliminating evasive answer bias. Journal of the American Statistical Association 1965 60 309 63 66 2-s2.0-0013776710
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-66
-
-
Warner, S.L.1
-
21
-
-
0035788918
-
Real world performance of association rule algorithms
-
August 2001 San Francisco, Calif, USA ACM 2-s2.0-0035788918
-
Zheng Z., Kohavi R., Mason L., Real world performance of association rule algorithms. Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '01) August 2001 San Francisco, Calif, USA ACM 401 406 2-s2.0-0035788918
-
Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '01)
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|