Data Distortion for Privacy Protection in a Terrorist Analysis System
暂无分享,去创建一个
Jie Wang | Dianwei Han | Shuting Xu | Jun Zhang | Jie Wang | Jun Zhang | Dianwei Han | Shuting Xu
[1] Jun Zhang,et al. Sparsification Strategies in Latent Semantic Indexing , 2003 .
[2] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[3] T. Landauer,et al. Indexing by Latent Semantic Analysis , 1990 .
[4] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[5] Richard A. Harshman,et al. Indexing by Latent Semantic Analysis , 1990, J. Am. Soc. Inf. Sci..
[6] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[7] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[8] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[9] David B. Skillicorn. Clusters within Clusters: SVD and Counterterrorism , 2003 .