Simultaneous Pattern and Data Hiding in Unsupervised Learning
暂无分享,去创建一个
Dianwei Han | Jun Zhang | Jie Wang | Lian Liu
[1] Kuo-Chung Tai,et al. The Tree-to-Tree Correction Problem , 1979, JACM.
[2] Jie Wang,et al. NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[3] Wuu Yang,et al. Identifying syntactic differences between two programs , 1991, Softw. Pract. Exp..
[4] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[5] Jie Wang,et al. Knowledge and Information Systems REGULAR PAPER , 2006 .
[6] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[7] Hector Garcia-Molina,et al. Extracting structured data from Web pages , 2003, SIGMOD '03.
[8] Xin Liu,et al. Document clustering based on non-negative matrix factorization , 2003, SIGIR.
[9] Arbee L. P. Chen,et al. Hiding Sensitive Association Rules with Limited Side Effects , 2007 .
[10] Daniel E. O'Leary,et al. Knowledge Discovery as a Threat to Database Security , 1991, Knowledge Discovery in Databases.
[11] Chih-Jen Lin,et al. Projected Gradient Methods for Nonnegative Matrix Factorization , 2007, Neural Computation.
[12] Chun-Nan Hsu,et al. Generating Finite-State Transducers for Semi-Structured Data Extraction from the Web , 1998, Inf. Syst..
[13] Chris Clifton,et al. SECURITY AND PRIVACY IMPLICATIONS OF DATA MINING , 1996 .