Data Mining and Privacy
暂无分享,去创建一个
[1] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[2] Udo Winand,et al. The VLEG based production and maintenance process for web-based learning applications , 2002 .
[3] John Wang,et al. Data Warehousing and Mining: Concepts, Methodologies, Tools, and Applications , 2008 .
[4] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[5] Stephen E. Fienberg,et al. Data Swapping: Variations on a Theme by Dalenius and Reiss , 2004, Privacy in Statistical Databases.
[6] Philip Calvert,et al. Encyclopedia of Data Warehousing and Mining , 2006 .
[7] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[8] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[9] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[10] Elisa Bertino,et al. A Framework for Evaluating Privacy Preserving Data Mining Algorithms* , 2005, Data Mining and Knowledge Discovery.
[11] Chi-Jen Lu,et al. Oblivious polynomial evaluation and oblivious neural learning , 2001, Theor. Comput. Sci..
[12] Balázs Kégl,et al. Privacy-preserving boosting , 2007, Data Mining and Knowledge Discovery.
[13] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[14] Kevin M. Curtin,et al. Integrating GIS and Maximal Covering Models to Determine Optimal Police Patrol Areas , 2005 .
[15] Joan Feigenbaum,et al. Secure Multiparty Computation of Approximations , 2001, ICALP.
[16] Alexandre V. Evfimievski,et al. Limiting privacy breaches in privacy preserving data mining , 2003, PODS.
[17] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.