Secure Mining of Association Rules in Distributed Datasets
暂无分享,去创建一个
[1] Kejia Zhang,et al. A Novel Method for Location Privacy Protection in LBS Applications , 2019, Secur. Commun. Networks.
[2] Jiguo Yu,et al. A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies , 2019, IEEE Transactions on Industrial Informatics.
[3] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[4] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[5] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[6] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[7] Xiang Cheng,et al. DP-Apriori: A differentially private frequent itemset mining algorithm based on transaction splitting , 2015, Comput. Secur..
[8] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[9] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[10] Guisheng Yin,et al. RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks , 2017, Sensors.
[11] Mohsen Guizani,et al. Lclean: A Plausible Approach to Individual Trajectory Data Sanitization , 2018, IEEE Access.
[12] Yingshu Li,et al. Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.
[13] Gan Wen-yon. Frequent Pattern Mining with Differential Privacy Based on Transaction Truncation , 2015 .
[14] Kejia Zhang,et al. Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition , 2018, Secur. Commun. Networks.
[15] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[16] Zhipeng Cai,et al. Trading Private Range Counting over Big IoT Data , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[17] Marina Blanton,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.
[18] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[19] Sheng Zhong,et al. Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..
[20] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[21] Kejia Zhang,et al. HRR: a data cleaning approach preserving local differential privacy , 2018, Int. J. Distributed Sens. Networks.
[22] Ninghui Li,et al. PrivBasis: Frequent Itemset Mining with Differential Privacy , 2012, Proc. VLDB Endow..
[23] Shipra Agrawal,et al. FRAPP: a framework for high-accuracy privacy-preserving mining , 2004, 21st International Conference on Data Engineering (ICDE'05).
[24] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[25] Yang Tang,et al. A Privacy Preserving Algorithm for Mining Distributed Association Rules , 2011, 2011 International Conference on Computer and Management (CAMAN).
[26] Hongli Zhang,et al. Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world , 2015, IEEE Network.
[27] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[28] Xiaojiang Du,et al. Publishing histograms with outliers under data differential privacy , 2016, Secur. Commun. Networks.