A Survey on Privacy Preserving Data Mining
暂无分享,去创建一个
[1] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[2] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[3] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[4] Chris Clifton,et al. Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.
[5] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[6] Yufei Tao,et al. Personalized privacy preservation , 2006, Privacy-Preserving Data Mining.
[7] Mikhail J. Atallah,et al. A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.
[8] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[9] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[10] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[11] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[12] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[13] Jun-Lin Lin,et al. Genetic algorithm-based clustering approach for k-anonymization , 2009, Expert Syst. Appl..
[14] Wenliang Du,et al. Using randomized response techniques for privacy-preserving data mining , 2003, KDD '03.
[15] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[16] Xintao Wu,et al. Privacy Preserving Market Basket Data Analysis , 2007, PKDD.
[17] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[18] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[19] Philip S. Yu,et al. Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).
[20] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[21] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[22] Xiaojun Ye,et al. An Improved Weighted-Feature Clustering Algorithm for K-anonymity , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[23] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[24] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[25] Grigorios Loukides,et al. An Efficient Clustering Algorithm for k-Anonymisation , 2008, Journal of Computer Science and Technology.
[26] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[27] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[28] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[29] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[30] Philip S. Yu,et al. Template-based privacy preservation in classification problems , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[31] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[32] Wang Zhi. Clustering-Based Approach for Data Anonymization , 2010 .
[33] Roberto J. Bayardo,et al. Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).
[34] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[35] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[36] Wenliang Du,et al. SVD-based collaborative filtering with privacy , 2005, SAC '05.
[37] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[38] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[39] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[40] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[41] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[42] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[43] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[44] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[45] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[46] Philip S. Yu,et al. Bottom-up generalization: a data mining solution to privacy protection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[47] Traian Marius Truta,et al. Protection : p-Sensitive k-Anonymity Property , 2006 .