Collusion-Free Privacy Preserving Data Mining
暂无分享,去创建一个
[1] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] R. Nedunchezhian,et al. Rapid Privacy Preserving Algorithm for Large Databases , 2006, Int. J. Intell. Inf. Technol..
[3] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .
[4] David Wai-Lok Cheung,et al. Efficient Mining of Association Rules in Distributed Databases , 1996, IEEE Trans. Knowl. Data Eng..
[5] Zvi M. Kedem,et al. Pincer-Search: An Efficient Algorithm for Discovering the Maximum Frequent Set , 2002, IEEE Trans. Knowl. Data Eng..
[6] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[7] Shyue-Liang Wang,et al. Hiding sensitive items in privacy preserving association rule mining , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[8] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[9] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[10] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[11] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[12] Vijayan Sugumaran. Intelligent support systems : knowledge management , 2002 .
[13] Yücel Saygin,et al. Privacy preserving association rule mining , 2002, Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002.
[14] Arbee L. P. Chen,et al. Hiding sensitive patterns in association rules mining , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..
[15] Alejandro Pazos Sierra,et al. Encyclopedia of Artificial Intelligence , 2008 .
[16] Julie E. Kendall,et al. Memes and Mutation: Societal Implications of Evolutionary Agents in Push Technologies , 2005, Int. J. Intell. Inf. Technol..
[17] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[18] Osmar R. Zaïane,et al. Algorithms for balancing privacy and knowledge discovery in association rule mining , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[19] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[20] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[21] Yücel Saygin,et al. Privacy Preserving Clustering on Horizontally Partitioned Data , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[22] Arbee L. P. Chen,et al. Hiding Sensitive Association Rules with Limited Side Effects , 2007 .
[23] Tim Boucher. Adapting Technical Theatre Principles and Practices to Immersive Computing and Mixed Reality Environments , 2010, Int. J. Ambient Comput. Intell..
[24] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[25] Jaideep Vaidya,et al. Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.
[26] Yonglong Luo,et al. An Algorithm for Privacy-Preserving Quantitative Association Rules Mining , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[27] David Taniar,et al. ODAM: An optimized distributed association rule mining algorithm , 2004, IEEE Distributed Systems Online.
[28] Zvi M. Kedem,et al. Pincer-Search: A New Algorithm for Discovering the Maximum Frequent Set , 1998, EDBT.
[29] Kate Smith-Miles,et al. PPDAM: Privacy-Preserving Distributed Association-Rule-Mining Algorithm , 2005, Int. J. Intell. Inf. Technol..
[30] Jian Pei,et al. Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[31] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[32] Chris Clifton,et al. Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.