Knowledge Reserving in Privacy Preserving Data Mining
暂无分享,去创建一个
[1] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[2] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[3] GehrkeJohannes,et al. Privacy preserving mining of association rules , 2004 .
[4] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[5] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[6] David J. DeWitt,et al. Incognito: efficient full-domain K-anonymity , 2005, SIGMOD '05.
[7] David J. DeWitt,et al. Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[8] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[9] Daniel Kifer,et al. Injecting utility into anonymized datasets , 2006, SIGMOD Conference.
[10] Yufei Tao,et al. Anatomy: simple and effective privacy preservation , 2006, VLDB.
[11] Ali Amiri,et al. Dare to share: Protecting sensitive knowledge with data sanitization , 2007, Decis. Support Syst..
[12] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[13] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[14] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[15] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.