A Survey on Privacy Preserving Data Mining Techniques
暂无分享,去创建一个
[1] Mohammad Naderi Dehkordi,et al. A Hybrid Algorithm based on Heuristic Method to Preserve Privacy in Association Rule Mining , 2016 .
[2] P. Sakthivel,et al. Preservation of Private Information using Secure Multi-Party Computation , 2016 .
[3] Yan Zhao,et al. A Survey on Privacy Preserving Approaches in Data Publishing , 2009, 2009 First International Workshop on Database Technology and Applications.
[4] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[5] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[6] Joshua Zhexue Huang,et al. Rating: Privacy Preservation for Multiple Attributes with Different Sensitivity Requirements , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[7] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[8] Pingshui Wang. Survey on Privacy Preserving Data Mining , 2010 .
[9] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[10] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[11] Andrew Chi-Chih Yao,et al. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[12] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[13] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[14] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..