Privacy-Preserving Collaborative Association Rule Mining
暂无分享,去创建一个
Stan Matwin | Justin Zhijun Zhan | LiWu Chang | Nathalie Japkowicz | J. Zhan | N. Japkowicz | S. Matwin | LiWu Chang
[1] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[2] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[3] Benny Pinkas,et al. Secure Computation of the k th-Ranked Element , 2004, EUROCRYPT.
[4] Michael Luby,et al. Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.
[5] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[8] Daniel A. Keim,et al. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining , 2002, KDD.
[9] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[10] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[11] Jaideep Vaidya,et al. Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.
[12] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[13] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[14] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[15] Wenliang Du,et al. Using randomized response techniques for privacy-preserving data mining , 2003, KDD '03.
[16] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[17] AgrawalRakesh,et al. Mining association rules between sets of items in large databases , 1993 .
[18] Cynthia Dwork,et al. Privacy-Preserving Datamining on Vertically Partitioned Databases , 2004, CRYPTO.