A Brief Survey on Privacy Preserving Techniques in Data Mining
暂无分享,去创建一个
[1] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[2] Murat Kantarcioglu,et al. Privacy Preserving Decision Tree Mining from Perturbed Data , 2009 .
[3] Keke Chen,et al. Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .
[4] Minghua Chen,et al. Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.
[5] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[6] Marina Blanton. Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[7] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[8] Heikki Mannila. Randomization Techniques for Data Mining Methods , 2008, ADBIS.
[9] Anil Prakash Dangi,et al. Privacy Preservation Measure using t-closeness with combined l-diversity and k-anonymity , 2012 .
[10] David J. DeWitt,et al. Workload-aware anonymization techniques for large-scale datasets , 2008, TODS.
[11] A. Vinaya Babu,et al. Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data , 2010, ArXiv.
[12] Naser Azad,et al. Information disclosure by data mining approach , 2012 .
[13] Raghvendra Kumar,et al. Privacy preservation in horizontally partitioned databases using randomized response technique , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[14] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[15] M. B. Malik,et al. Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects , 2012, 2012 Third International Conference on Computer and Communication Technology.
[16] M. Vedanayaki,et al. A Study of Data Mining and Social Network Analysis , 2014 .
[17] Vinod Kumar Yadav,et al. An Efficient Association Rule Hiding Algorithm for Privacy Preserving Data Mining , 2011 .
[18] Li Liu,et al. Privacy Preserving Decision Tree Mining from Perturbed Data , 2009, 2009 42nd Hawaii International Conference on System Sciences.