-
2
-
-
84865096110
-
Output space sampling for graph patterns
-
M. Al Hasan and M. J. Zaki. Output space sampling for graph patterns. Proc. VLDB, 2(1):730-741, 2009.
-
(2009)
Proc. VLDB
, vol.2
, Issue.1
, pp. 730-741
-
-
Hasan, M.A.1
Zaki, M.J.2
-
3
-
-
77956209107
-
Discovering frequent patterns in sensitive data
-
R. Bhaskar, S. Laxman, A. Smith, and A. Thakurta. Discovering frequent patterns in sensitive data. In KDD, pages 503-512, 2010.
-
(2010)
KDD
, pp. 503-512
-
-
Bhaskar, R.1
Laxman, S.2
Smith, A.3
Thakurta, A.4
-
5
-
-
4644303571
-
A (sub) graph isomorphism algorithm for matching large graphs
-
L. Cordella, P. Foggia, C. Sansone, and M. Vento. A (sub) graph isomorphism algorithm for matching large graphs. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 26(10), 2004.
-
(2004)
Pattern Analysis and Machine Intelligence, IEEE Transactions on
, vol.26
, Issue.10
-
-
Cordella, L.1
Foggia, P.2
Sansone, C.3
Vento, M.4
-
6
-
-
84864197091
-
Differentially private spatial decompositions
-
G. Cormode, C. Procopiuc, E. Shen, D. Srivastava, and T. Yu. Differentially Private Spatial Decompositions. ICDE, 2012.
-
(2012)
ICDE
-
-
Cormode, G.1
Procopiuc, C.2
Shen, E.3
Srivastava, D.4
Yu, T.5
-
7
-
-
79959954388
-
Differentially private data cubes: Optimizing noise sources and consistency
-
B. Ding, M. Winslett, and J. Han. Differentially private data cubes: optimizing noise sources and consistency. SIGMOD, 2011.
-
(2011)
SIGMOD
-
-
Ding, B.1
Winslett, M.2
Han, J.3
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. Theory of Cryptography, pages 265-284, 2006.
-
(2006)
Theory of Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
10
-
-
0001032163
-
Evaluating the accuracy of sampling-based approaches to the calculation of posterior moments
-
J. Geweke. Evaluating the accuracy of sampling-based approaches to the calculation of posterior moments. In Bayesian Statistics, 1992.
-
(1992)
Bayesian Statistics
-
-
Geweke, J.1
-
12
-
-
77953303843
-
Walking in facebook: A case study of unbiased sampling of osns
-
M. Gjoka, M. Kurant, C. Butts, and A. Markopoulou. Walking in facebook: A case study of unbiased sampling of osns. In INFOCOM, pages 1-9, 2010.
-
(2010)
INFOCOM
, pp. 1-9
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.3
Markopoulou, A.4
-
13
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
Dec
-
M. Hay, C. Li, G. Miklau, and D. Jensen. Accurate Estimation of the Degree Distribution of Private Networks. ICDE, pages 169-178, Dec. 2009.
-
(2009)
ICDE
, pp. 169-178
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
16
-
-
84863487270
-
Private analysis of graph structure
-
V. Karwa, S. Raskhodnikova, and A. Smith. Private Analysis of Graph Structure. Proceedings of the VLDB, 4(11):1146-1157, 2011.
-
(2011)
Proceedings of the VLDB
, vol.4
, Issue.11
, pp. 1146-1157
-
-
Karwa, V.1
Raskhodnikova, S.2
Smith, A.3
-
17
-
-
84872862536
-
Privbasis: Frequent itemset mining with differential privacy
-
July
-
N. Li, W. Qardaji, D. Su, and J. Cao. Privbasis: frequent itemset mining with differential privacy. VLDB Endow., 5(11), July 2012.
-
(2012)
VLDB Endow.
, vol.5
, Issue.11
-
-
Li, N.1
Qardaji, W.2
Su, D.3
Cao, J.4
-
18
-
-
84455177094
-
Personalized social recommendations-Accurate or private?
-
A. Machanavajjhala, A. Korolova, and A. Sarma. Personalized social recommendations-Accurate or private? VLDB, 4(7), 2011.
-
(2011)
VLDB
, vol.4
, Issue.7
-
-
Machanavajjhala, A.1
Korolova, A.2
Sarma, A.3
-
19
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the netflix prize contenders
-
F. McSherry and I. Mironov. Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In KDD, pages 627-636, 2009.
-
(2009)
KDD
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
20
-
-
46749128577
-
Mechanism Design via Differential Privacy
-
F. McSherry and K. Talwar. Mechanism Design via Differential Privacy. FOCS, 2007.
-
(2007)
FOCS
-
-
McSherry, F.1
Talwar, K.2
-
21
-
-
84864372044
-
Privacy-preserving subgraph discovery
-
Springer
-
D. Mehmood, B. Shafiq, J. Vaidya, Y. Hong, N. Adam, and V. Atluri. Privacy-preserving subgraph discovery. In Data and Applications Security and Privacy XXVI, pages 161-176. Springer, 2012.
-
(2012)
Data and Applications Security and Privacy XXVI
, pp. 161-176
-
-
Mehmood, D.1
Shafiq, B.2
Vaidya, J.3
Hong, Y.4
Adam, N.5
Atluri, V.6
-
22
-
-
80052663001
-
Differentially private data release for data mining
-
N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially Private Data Release for Data Mining. KDD, 2011.
-
(2011)
KDD
-
-
Mohammed, N.1
Chen, R.2
Fung, B.C.M.3
Yu, P.S.4
-
23
-
-
34547622829
-
On the structural properties of massive telecom call graphs: Findings and implications
-
ACM
-
A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi. On the structural properties of massive telecom call graphs: findings and implications. In Proceedings of CIKM, pages 435-444. ACM, 2006.
-
(2006)
Proceedings of CIKM
, pp. 435-444
-
-
Nanavati, A.1
Gurumurthy, S.2
Das, G.3
Chakraborty, D.4
Dasgupta, K.5
Mukherjea, S.6
Joshi, A.7
-
25
-
-
82955196835
-
Sharing graphs using differentially private graph models
-
ACM
-
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pages 81-98. ACM, 2011.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 81-98
-
-
Sala, A.1
Zhao, X.2
Wilson, C.3
Zheng, H.4
Zhao, B.Y.5
-
29
-
-
78149333073
-
Gspan: Graph-based substructure pattern mining
-
X. Yan and J. Han. gspan: Graph-based substructure pattern mining. In ICDM, 2002.
-
(2002)
ICDM
-
-
Yan, X.1
Han, J.2
-
30
-
-
24344486868
-
Efficiently mining frequent trees in a forest: Algorithms and applications
-
M. Zaki. Efficiently mining frequent trees in a forest: Algorithms and applications. Knowledge and Data Engineering, IEEE Transactions on, 17(8):1021-1035, 2005.
-
(2005)
Knowledge and Data Engineering, IEEE Transactions on
, vol.17
, Issue.8
, pp. 1021-1035
-
-
Zaki, M.1
|