A survey on privacy preserving mining implementing techniques
暂无分享,去创建一个
[1] Philip S. Yu,et al. k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining , 2010, KDD.
[2] Rebecca N. Wright,et al. Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data , 2006, IEEE Transactions on Knowledge and Data Engineering.
[3] K. Anbazhagan,et al. An Efficient Algorithm for Privacy Preserving Data Mining Using Heuristic Approach , 2013 .
[4] Muttukrishnan Rajarajan,et al. Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud , 2014, IEEE Transactions on Dependable and Secure Computing.
[5] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[6] Nikos Mamoulis,et al. Security in Outsourcing of Association Rule Mining , 2007, VLDB.
[7] Franco Turini,et al. Discrimination-aware data mining , 2008, KDD.
[8] Onna,et al. Privacy-Preserving Mining of Association Rules from Outsourced Transaction Databases , 2015 .
[9] Elisa Bertino,et al. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization , 2014, IEEE Transactions on Knowledge and Data Engineering.
[10] Minghua Chen,et al. Enabling Multilevel Trust in Privacy Preserving Data Mining , 2011, IEEE Transactions on Knowledge and Data Engineering.
[11] K. Madhavi,et al. Differential Privacy Preserving Algorithm For Data Anonymization , 2016 .
[12] Franco Turini,et al. Measuring Discrimination in Socially-Sensitive Decision Records , 2009, SDM.
[13] Josep Domingo-Ferrer,et al. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining , 2013, IEEE Transactions on Knowledge and Data Engineering.
[14] K. Sathiyapriya,et al. A Survey on Privacy Preserving Association Rule Mining , 2013 .