-
2
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainity Fuzziness Knowl.-Base Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainity Fuzziness Knowl.-Base Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
3
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "l-diversity: Privacy beyond k-anonymity," in Proc. 22nd Int. Conf. Data Eng., 2006, p. 24.
-
(2006)
Proc. 22nd Int. Conf. Data Eng.
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
5
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin, "Mining frequent patterns without candidate generation," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2000, pp. 1-12.
-
(2000)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
6
-
-
84875100172
-
On differentially private frequent itemset mining
-
C. Zeng, J. F. Naughton, and J.-Y. Cai, "On differentially private frequent itemset mining," Proc. VLDB Endowment, vol. 6, no. 1, pp. 25-36, 2012.
-
(2012)
Proc. VLDB Endowment
, vol.6
, Issue.1
, pp. 25-36
-
-
Zeng, C.1
Naughton, J.F.2
Cai, J.-Y.3
-
8
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Sep
-
M. Kantarcioglu and C. Clifton, "Privacy-preserving distributed mining of association rules on horizontally partitioned data," IEEE Trans. Knowl. Data Eng., vol. 16, no. 9, pp. 1026-1037, Sep. 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
9
-
-
85011072055
-
Security in outsourcing of association rule mining
-
W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "Security in outsourcing of association rule mining," in Proc. 33rd Int. Conf. Very Large Data Bases, 2007, pp. 111-122.
-
(2007)
Proc. 33rd Int. Conf. Very Large Data Bases
, pp. 111-122
-
-
Wong, W.K.1
Cheung, D.W.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
-
10
-
-
77949621132
-
An audit environment for outsourcing of frequent itemset mining
-
W. K. Wong, D. W. Cheung, E. Hung, B. Kao, and N. Mamoulis, "An audit environment for outsourcing of frequent itemset mining," Proc. VLDB Endowment, vol. 2, no. 1, pp. 1162-1173, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, Issue.1
, pp. 1162-1173
-
-
Wong, W.K.1
Cheung, D.W.2
Hung, E.3
Kao, B.4
Mamoulis, N.5
-
11
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," in Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2002, pp. 217-228.
-
(2002)
Proc. 8th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
12
-
-
45749101998
-
Anonymity preserving pattern discovery
-
Maurizio Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi, "Anonymity preserving pattern discovery," VLDB J., vol. 17, no. 4, pp. 703-727, 2008.
-
(2008)
VLDB J.
, vol.17
, Issue.4
, pp. 703-727
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
13
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta, "Discovering frequent patterns in sensitive data," in Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2010, pp. 503-512.
-
(2010)
Proc. 16th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
14
-
-
84872862536
-
Privbasis: Frequent itemset mining with differential privacy
-
N. Li, W. Qardaji, D. Su, and J. Cao, "Privbasis: Frequent itemset mining with differential privacy," Proc. VLDB Endowment, vol. 5, no. 11, pp. 1340-1351, 2012.
-
(2012)
Proc. VLDB Endowment
, vol.5
, Issue.11
, pp. 1340-1351
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
16
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd Conf. Theory Cryptography, 2006, pp. 265-284.
-
(2006)
Proc. 3rd Conf. Theory Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
17
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong, "Publishing set-valued data via differential privacy," in Proc. Int. Conf. Very Large Data Bases, 2011, pp. 1087-1098.
-
(2011)
Proc. Int. Conf. Very Large Data Bases
, pp. 1087-1098
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
18
-
-
84892849710
-
Differentially private set-valued data release against incremental updates
-
X. Zhang, X. Meng, and R. Chen, "Differentially private set-valued data release against incremental updates," in Proc. 18th Int. Conf. Database Syst. Adv. Appl., 2013, pp. 392-406.
-
(2013)
Proc. 18th Int. Conf. Database Syst. Adv. Appl.
, pp. 392-406
-
-
Zhang, X.1
Meng, X.2
Chen, R.3
-
19
-
-
84889607657
-
A two-phase algorithm for mining sequential patterns with differential privacy
-
L. Bonomi and L. Xiong, "A two-phase algorithm for mining sequential patterns with differential privacy," in Proc. 22nd ACM Conf. Inf. Knowl. Manage., 2013, pp. 269-278.
-
(2013)
Proc. 22nd ACM Conf. Inf. Knowl. Manage.
, pp. 269-278
-
-
Bonomi, L.1
Xiong, L.2
-
21
-
-
84866022540
-
Differentially private transit data publication: A case study on the montreal transportation system
-
R. Chen, B. C. M. Fung, and B. C. Desai, "Differentially private transit data publication: A case study on the montreal transportation system," in Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2012, pp. 213-221.
-
(2012)
Proc. 18th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 213-221
-
-
Chen, R.1
Fung, B.C.M.2
Desai, B.C.3
-
22
-
-
84869393316
-
Differentially private sequential data publication via variable-length n-grams
-
R. Chen, G. Acs, and C. Castelluccia, "Differentially private sequential data publication via variable-length n-grams," in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 638-649.
-
(2012)
Proc. ACM Conf. Comput. Commun. Security
, pp. 638-649
-
-
Chen, R.1
Acs, G.2
Castelluccia, C.3
-
23
-
-
84871605204
-
Universally utility-maximizing privacy mechanisms
-
A. Ghosh, T. Roughgarden, and M. Sundararajan, "Universally utility-maximizing privacy mechanisms," SIAM J. Comput., vol. 41, no. 6, pp. 1673-1693, 2012.
-
(2012)
SIAM J. Comput.
, vol.41
, Issue.6
, pp. 1673-1693
-
-
Ghosh, A.1
Roughgarden, T.2
Sundararajan, M.3
-
24
-
-
17044376078
-
Subspace clustering for high dimensional data: A review
-
L. Parsons, E. Haque, and H. Liu, "Subspace clustering for high dimensional data: A review," SIGKDD Explorations, vol. 6, no. 1, pp. 90-105, 2004.
-
(2004)
SIGKDD Explorations
, vol.6
, Issue.1
, pp. 90-105
-
-
Parsons, L.1
Haque, E.2
Liu, H.3
-
25
-
-
56349094785
-
Fast unfolding of communities in large networks
-
V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, "Fast unfolding of communities in large networks,"J. Statist. Mech.: Theory Experiment, vol. 10, p. P10008, 2008.
-
(2008)
J. Statist. Mech.: Theory Experiment
, vol.10
-
-
Blondel, V.D.1
Guillaume, J.-L.2
Lambiotte, R.3
Lefebvre, E.4
-
26
-
-
0001225295
-
Approximation algorithms for minimum sum p-clustering
-
N. Guttmann-Beck and R. Hassin, "Approximation algorithms for minimum sum p-clustering," Discrete Appl. Math., vol. 89, nos. 1-3, pp. 125-142, 1998.
-
(1998)
Discrete Appl. Math.
, vol.89
, Issue.1-3
, pp. 125-142
-
-
Guttmann-Beck, N.1
Hassin, R.2
-
27
-
-
0035788918
-
Real world performance of association rule algorithms
-
Z. Zheng, R. Kohavi, and L. Mason, "Real world performance of association rule algorithms," in Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining, 2001, pp. 401-406.
-
(2001)
Proc. 7th ACM SIGKDD Int. Conf. Knowl. Discovery Data Mining
, pp. 401-406
-
-
Zheng, Z.1
Kohavi, R.2
Mason, L.3
|