Mining frequent graph patterns with differential privacy
暂无分享,去创建一个
Ting Yu | Entong Shen | E. Shen | Ting Yu
[1] Shen-Shyang Ho,et al. Differential privacy for location pattern mining , 2011, SPRINGL '11.
[2] Sofya Raskhodnikova,et al. Private analysis of graph structure , 2011, Proc. VLDB Endow..
[3] Charu C. Aggarwal,et al. On Anonymization of Multi-graphs , 2011, SDM.
[4] Reuven Y. Rubinstein,et al. Simulation and the Monte Carlo method , 1981, Wiley series in probability and mathematical statistics.
[5] Sofya Raskhodnikova,et al. Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.
[6] Frank Harary,et al. Graphical enumeration , 1973 .
[7] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] Minas Gjoka,et al. Walking in Facebook: A Case Study of Unbiased Sampling of OSNs , 2010, 2010 Proceedings IEEE INFOCOM.
[9] D. Rubin,et al. Inference from Iterative Simulation Using Multiple Sequences , 1992 .
[10] Mohammed J. Zaki. Efficiently mining frequent trees in a forest: algorithms and applications , 2005, IEEE Transactions on Knowledge and Data Engineering.
[11] Sougata Mukherjea,et al. On the structural properties of massive telecom call graphs: findings and implications , 2006, CIKM '06.
[12] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[13] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[14] David D. Jensen,et al. Accurate Estimation of the Degree Distribution of Private Networks , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[15] Takashi Washio,et al. An Apriori-Based Algorithm for Mining Frequent Substructures from Graph Data , 2000, PKDD.
[16] Peter Green,et al. Markov chain Monte Carlo in Practice , 1996 .
[17] Dirk P. Kroese,et al. Simulation and the Monte Carlo Method (Wiley Series in Probability and Statistics) , 1981 .
[18] Charu C. Aggarwal,et al. Managing and Mining Graph Data , 2010, Managing and Mining Graph Data.
[19] Philip S. Yu,et al. Differentially private data release for data mining , 2011, KDD.
[20] John Geweke,et al. Evaluating the accuracy of sampling-based approaches to the calculation of posterior moments , 1991 .
[21] Divesh Srivastava,et al. Differentially Private Spatial Decompositions , 2011, 2012 IEEE 28th International Conference on Data Engineering.
[22] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[23] Marianne Winslett,et al. Differentially private data cubes: optimizing noise sources and consistency , 2011, SIGMOD '11.
[24] FoggiaPasquale,et al. A (Sub)Graph Isomorphism Algorithm for Matching Large Graphs , 2004 .
[25] Vijayalakshmi Atluri,et al. Privacy-Preserving Subgraph Discovery , 2012, DBSec.
[26] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[27] Mohammad Al Hasan,et al. Output Space Sampling for Graph Patterns , 2009, Proc. VLDB Endow..
[28] Ashwin Machanavajjhala,et al. Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..
[29] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[30] Mario Vento,et al. A (sub)graph isomorphism algorithm for matching large graphs , 2004, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Ninghui Li,et al. PrivBasis: Frequent Itemset Mining with Differential Privacy , 2012, Proc. VLDB Endow..
[32] Johannes Gehrke,et al. Differential privacy via wavelet transforms , 2009, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).
[33] Jiawei Han,et al. gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[34] Cynthia Dwork,et al. Privacy, accuracy, and consistency too: a holistic solution to contingency table release , 2007, PODS.
[35] Adam D. Smith,et al. Discovering frequent patterns in sensitive data , 2010, KDD.
[36] Frank McSherry,et al. Probabilistic Inference and Differential Privacy , 2010, NIPS.
[37] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.
[38] Ben Y. Zhao,et al. Sharing graphs using differentially private graph models , 2011, IMC '11.