Two Noise Addition Methods For Privacy-Preserving Data Mining ∗
暂无分享,去创建一个
Di Wang | Liang Hu | Likun Liu | Lei Yang | Kexin Yang | Yanmei Huo
[1] Durvasula V. L. N. Somayajulu,et al. A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining , 2010, ArXiv.
[2] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[3] Keke Chen,et al. Towards Attack-Resilient Geometric Data Perturbation , 2007, SDM.
[4] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Yingjiu Li,et al. On the Lower Bound of Reconstruction Error for Spectral Filtering Based Privacy Preserving Data Mining , 2006, PKDD.
[7] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[8] Li Liu,et al. Privacy Preserving Decision Tree Mining from Perturbed Data , 2009, 2009 42nd Hawaii International Conference on System Sciences.
[9] Stephen E. Fienberg,et al. Data Swapping: Variations on a Theme by Dalenius and Reiss , 2004, Privacy in Statistical Databases.
[10] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[11] Liu Yi,et al. A Novel Similarity Measure Framework on Financial Data Mining , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[12] Rathindra Sarathy,et al. Data Shuffling - A New Masking Approach for Numerical Data , 2006, Manag. Sci..