Attribute Segregation based on Feature Ranking Framework for Privacy Preserving Data Mining
暂无分享,去创建一个
[1] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[2] Zhihong Chong,et al. Clustering-oriented privacy-preserving data publishing , 2012, Knowl. Based Syst..
[3] Minghua Chen,et al. Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.
[4] V. Rajalakshmi,et al. Anonymization by Data Relocation Using Sub-clustering for Privacy Preserving Data Mining , 2014 .
[5] Lior Rokach,et al. Privacy-preserving data mining: A feature set partitioning approach , 2010, Inf. Sci..
[6] J. Ross Quinlan,et al. Learning Efficient Classification Procedures and Their Application to Chess End Games , 1983 .
[7] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[8] Jie Wang,et al. Knowledge and Information Systems REGULAR PAPER , 2006 .
[9] Yiyu Yao,et al. Information-Theoretic Measures for Knowledge Discovery and Data Mining , 2003 .
[10] Xiaowei Ying,et al. On Attribute Disclosure in Randomization Based Privacy Preserving Data Publishing , 2010, 2010 IEEE International Conference on Data Mining Workshops.
[11] Jun Zhang,et al. A Comparative Study on Data Perturbation with Feature Selection , 2011 .
[12] Ruggero G. Pensa,et al. From Context to Distance: Learning Dissimilarity for Categorical Data Clustering , 2012, TKDD.
[13] Liang Hu,et al. Using Noise Addition Method Based on Pre-mining to Protect Healthcare Privacy , 2012 .
[14] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[15] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[16] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[17] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[18] N. Nagaveni,et al. Evaluation of a perturbation-based technique for privacy preservation in a multi-party clustering scenario , 2013, Inf. Sci..
[19] Songjie Gong,et al. Privacy-preserving Collaborative Filtering based on Randomized Perturbation Techniques and Secure Multiparty Computation , 2011 .
[20] Carlo Zaniolo,et al. Publishing Naive Bayesian Classifiers: Privacy without Accuracy Loss , 2009, Proc. VLDB Endow..
[21] Slava Kisilevich,et al. Efficient Multidimensional Suppression for K-Anonymity , 2010, IEEE Transactions on Knowledge and Data Engineering.