Data Mining for Security Applications and Its Privacy Implications
暂无分享,去创建一个
[1] Murat Kantarcioglu,et al. Privacy Preserving Decision Tree Mining from Perturbed Data , 2009 .
[2] Li Liu,et al. The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..
[3] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[4] Dino Pedreschi,et al. Knowledge Discovery in Databases: PKDD 2004 , 2004, Lecture Notes in Computer Science.
[5] Ovidio Salvetti,et al. Semi-Automatic Semantic Annotation of Images , 2007 .
[6] Chris Clifton,et al. Using Sample Size to Limit Exposure to Data Mining , 2000, J. Comput. Secur..
[7] Chris Clifton,et al. Privately Computing a Distributed k-nn Classifier , 2004, PKDD.
[8] Bhavani M. Thuraisingham,et al. Privacy constraint processing in a privacy-enhanced database management system , 2005, Data Knowl. Eng..
[9] Murat Kantarcioglu,et al. Privacy-Preserving Data Mining Applications in the Malicious Model , 2007 .