Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing
暂无分享,去创建一个
[1] Xintao Wu,et al. Privacy Preserving Market Basket Data Analysis , 2007, PKDD.
[2] Chris Clifton,et al. Privacy-preserving Naïve Bayes classification , 2008, The VLDB Journal.
[3] Chris Clifton,et al. Privacy-preserving clustering with distributed EM mixture modeling , 2004, Knowledge and Information Systems.
[4] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[5] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[6] Jun-Lin Lin,et al. Genetic algorithm-based clustering approach for k-anonymization , 2009, Expert Syst. Appl..
[7] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[8] Chris Clifton,et al. Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.
[9] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[10] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[11] Grigorios Loukides,et al. An Efficient Clustering Algorithm for k-Anonymisation , 2008, Journal of Computer Science and Technology.
[12] Chris Clifton,et al. Transforming Semi-Honest Protocols to Ensure Accountability , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[13] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[14] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[15] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[16] Evimaria Terzi,et al. On Honesty in Sovereign Information Sharing , 2006, EDBT.
[17] Murat Kantarcioglu,et al. Incentive Compatible Privacy-Preserving Data Analysis , 2013, IEEE Transactions on Knowledge and Data Engineering.
[18] Wei Jiang,et al. A Secure and Distributed Framework to Identify and Share Needed Information , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[19] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[20] Murat Kantarcioglu,et al. Privacy-preserving data mining in the malicious model , 2008, Int. J. Inf. Comput. Secur..
[21] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[22] Li Liu,et al. Privacy Preserving Decision Tree Mining from Perturbed Data , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[23] Chris Clifton,et al. Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.
[24] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.