Secure construction and publication of contingency tables from distributed data
暂无分享,去创建一个
[1] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[2] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[3] Rebecca N. Wright,et al. Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data , 2006, IEEE Transactions on Knowledge and Data Engineering.
[4] L. H. Cox,et al. Controlled rounding for tables with subtotals , 1989 .
[5] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..
[6] Petros Dellaportas,et al. Model determination for categorical data with factor level merging , 2005 .
[7] L. Cox. On properties of multi-dimensional statistical tables , 2003 .
[8] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[9] Yingjiu Li,et al. Practical Inference Control for Data Cubes , 2008, IEEE Transactions on Dependable and Secure Computing.
[10] S E Fienberg,et al. INAUGURAL ARTICLE by a Recently Elected Academy Member:Bounds for cell entries in contingency tables given marginal totals and decomposable graphs , 2000 .