The applicability of the perturbation based privacy preserving data mining for real-world data
暂无分享,去创建一个
Li Liu | Bhavani M. Thuraisingham | Murat Kantarcioglu | Murat Kantarcioglu | B. Thuraisingham | Li Liu
[1] Chris Clifton,et al. Privately Computing a Distributed k-nn Classifier , 2004, PKDD.
[2] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[3] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[4] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[5] Wenliang Du,et al. Using randomized response techniques for privacy-preserving data mining , 2003, KDD '03.
[6] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[7] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[8] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[9] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[10] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[11] R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions , 1989 .
[12] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[13] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[14] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[15] A. Tamhane. Randomized Response Techniques for Multiple Sensitive Attributes , 1981 .
[16] Ian Witten,et al. Data Mining , 2000 .
[17] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[18] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[19] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[20] Kun Liu,et al. An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining , 2006, PKDD.