An Approach to Outsourcing Data Mining Tasks while Protecting Business Intelligence and Customer Privacy
暂无分享,去创建一个
Ling Qiu | Yingjiu Li | Xintao Wu | Yingjiu Li | Xintao Wu | Ling Qiu
[1] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[2] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[3] Sushil Jajodia,et al. Discovering calendar-based temporal association rules , 2001, Proceedings Eighth International Symposium on Temporal Representation and Reasoning. TIME 2001.
[4] Chris Clifton,et al. Using unknowns to prevent discovery of association rules , 2001, SGMD.
[5] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[6] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[7] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[8] Sushil Jajodia,et al. Auditing Interval-Based Inference , 2002, CAiSE.
[9] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[10] Jayant R. Haritsa,et al. A Framework for High-Accuracy Privacy-Preserving Mining , 2005, ICDE.
[11] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .