-
1
-
-
84873449020
-
Cloud-enabled privacypreserving collaborative learning for mobile sensing
-
B. Liu, Y. Jiang, F. Sha, and R. Govindan, "Cloud-enabled privacypreserving collaborative learning for mobile sensing," in SenSys'12. ACM, 2012, pp. 57-70.
-
(2012)
SenSys'12. ACM
, pp. 57-70
-
-
Liu, B.1
Jiang, Y.2
Sha, F.3
Govindan, R.4
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
ACM
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in ACM Sigmod Record, vol. 29, no. 2. ACM, 2000, pp. 439-450.
-
(2000)
ACM Sigmod Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
K. Liu, H. Kargupta, and J. Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining," Knowledge and Data Engineering, IEEE Transactions on, vol. 18, no. 1, pp. 92-106, 2006.
-
(2006)
Knowledge and Data Engineering, IEEE Transactions on
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
4
-
-
79551683372
-
Privacy-preserving outlier detection through random nonlinear data distortion
-
K. Bhaduri, M. D. Stefanski, and A. N. Srivastava, "Privacy-preserving outlier detection through random nonlinear data distortion," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 41, no. 1, pp. 260-272, 2011.
-
(2011)
Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on
, vol.41
, Issue.1
, pp. 260-272
-
-
Bhaduri, K.1
Stefanski, M.D.2
Srivastava, A.N.3
-
5
-
-
84901265057
-
Privacy-preserving collaborative anomaly detection for participatory sensing
-
Springer International Publishing
-
S. M. Erfani, Y. W. Law, S. Karunasekera, C. A. Leckie, and M. Palaniswami, "Privacy-preserving collaborative anomaly detection for participatory sensing," in Advances in Knowledge Discovery and Data Mining, ser. Lecture Notes in Computer Science. Springer International Publishing, 2014, vol. 8443, pp. 581-593.
-
(2014)
Advances in Knowledge Discovery and Data Mining, Ser. Lecture Notes in Computer Science
, vol.8443
, pp. 581-593
-
-
Erfani, S.M.1
Law, Y.W.2
Karunasekera, S.3
Leckie, C.A.4
Palaniswami, M.5
-
6
-
-
33746335051
-
Differential privacy
-
Springer Berlin Heidelberg
-
C. Dwork, "Differential privacy," in Automata, Languages and Programming, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2006, vol. 4052, pp. 1-12.
-
(2006)
Automata, Languages and Programming, Ser. Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
7
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Theory of Cryptography, 2006, vol. 3876, pp. 265-284.
-
(2006)
Theory of Cryptography
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
8
-
-
85075489334
-
Privacypreserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacypreserving aggregation of time-series data," in NDSS, vol. 2, no. 3, 2011, p. 4.
-
(2011)
NDSS
, vol.2
, Issue.3
, pp. 4
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
9
-
-
80053020495
-
I Have a DREAM! (DiffeRentially privatE smArt Metering)
-
G. Ács and C. Castelluccia, "I Have a DREAM! (DiffeRentially privatE smArt Metering)," in Information Hiding, 2011, vol. 6958, pp. 118-132.
-
(2011)
Information Hiding
, vol.6958
, pp. 118-132
-
-
Ács, G.1
Castelluccia, C.2
-
10
-
-
82555168400
-
Effective reconstruction of data perturbed by random projections
-
Y. Sang, H. Shen, and H. Tian, "Effective reconstruction of data perturbed by random projections," IEEE Transactions on Computers, vol. 61, no. 1, pp. 101-117, 2012.
-
(2012)
IEEE Transactions on Computers
, vol.61
, Issue.1
, pp. 101-117
-
-
Sang, Y.1
Shen, H.2
Tian, H.3
-
11
-
-
29844458622
-
Deriving private information from randomized data
-
Z. Huang, W. Du, and B. Chen, "Deriving private information from randomized data," in Proc. 2005 ACM SIGMOD international conference on Management of data. ACM, 2005, pp. 37-48.
-
(2005)
Proc. 2005 ACM SIGMOD International Conference on Management of Data. ACM
, pp. 37-48
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
13
-
-
84871925104
-
Breaching euclidean distance-preserving data perturbation using few known inputs
-
C. R. Giannella, K. Liu, and H. Kargupta, "Breaching euclidean distance-preserving data perturbation using few known inputs," Data &Knowledge Engineering, vol. 83, pp. 93-110, 2013.
-
(2013)
Data &Knowledge Engineering
, vol.83
, pp. 93-110
-
-
Giannella, C.R.1
Liu, K.2
Kargupta, H.3
-
14
-
-
82555168400
-
Effective reconstruction of data perturbed by random projections
-
Y. Sang, H. Shen, and H. Tian, "Effective reconstruction of data perturbed by random projections," Computers, IEEE Transactions on, vol. 61, no. 1, pp. 101-117, 2012.
-
(2012)
Computers, IEEE Transactions on
, vol.61
, Issue.1
, pp. 101-117
-
-
Sang, Y.1
Shen, H.2
Tian, H.3
-
15
-
-
62649103793
-
Privacy-preserving classification of horizontally partitioned data via random kernels
-
O. L. Mangasarian and E. W. Wild, "Privacy-preserving classification of horizontally partitioned data via random kernels," in Proc. International Conference on Data Mining (DMIN), vol. 2, 2008, pp. 473-479.
-
(2008)
Proc. International Conference on Data Mining (DMIN)
, vol.2
, pp. 473-479
-
-
Mangasarian, O.L.1
Wild, E.W.2
-
16
-
-
84869780508
-
-
InTech, , ch. Deploying RFID-Challenges, Solutions, and Open Issues
-
A. Serbanati et al., Building Blocks of the Internet of Things: State of the Art and Beyond. InTech, 2011, ch. Deploying RFID-Challenges, Solutions, and Open Issues.
-
(2011)
Building Blocks of the Internet of Things: State of the Art and beyond
-
-
Serbanati, A.1
-
17
-
-
84876943063
-
Internet of things (iot): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of things (iot): A vision, architectural elements, and future directions," Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
18
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
G. Theodorakopoulos and J. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318-328, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.2
-
21
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Y. Sun et al., "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305-317, 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.1
-
22
-
-
84856043672
-
A mathematical theory of communication
-
C. Shannon, "A mathematical theory of communication," The Bell System Technical Journal, vol. 27, no. 3, pp. 379-423, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.1
|