Analysis of privacy preserving random perturbation techniques: further explorations
暂无分享,去创建一个
Haimonti Dutta | Hillol Kargupta | Krishnamoorthy Sivakumar | Souptik Datta | K. Sivakumar | H. Kargupta | Haimonti Dutta | Souptik Datta
[1] Dennis Shasha,et al. StatStream: Statistical Monitoring of Thousands of Data Streams in Real Time , 2002, VLDB.
[2] Ted E. Senator,et al. Restructuring Databases for Knowledge Discovery by Consolidation and Link Formation , 1995, KDD.
[3] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[4] Lawrence B. Holder,et al. Graph-Based Data Mining , 2000, IEEE Intell. Syst..
[5] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[6] Ramakrishnan Srikant,et al. Mining quantitative association rules in large relational tables , 1996, SIGMOD '96.
[7] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[8] Alexandre V. Evfimievski,et al. Randomization in privacy preserving data mining , 2002, SKDD.
[9] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[10] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[11] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[12] Arnold D. Well,et al. Many Faces of the Correlation Coefficient , 1997 .
[13] Malcolm K. Sparrow,et al. The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .
[14] L. Parra,et al. An Introduction to Independent Component Analysis and Blind Source Separation , 2001 .
[15] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.