Sciweavers

337 search results - page 11 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
14 years 9 months ago
State-of-the-art in privacy preserving data mining
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. We also propose a classification hierarchy that sets the basis for ana...
Vassilios S. Verykios, Elisa Bertino, Igor Nai Fov...
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 10 months ago
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining
The randomized response (RR) technique is a promising technique to disguise private categorical data in Privacy-Preserving Data Mining (PPDM). Although a number of RR-based methods...
Zhengli Huang, Wenliang Du
SIGKDD
2002
90views more  SIGKDD 2002»
13 years 8 months ago
Cryptographic Techniques for Privacy-Preserving Data Mining
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that n...
Benny Pinkas
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 10 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng
PKDD
2007
Springer
214views Data Mining» more  PKDD 2007»
14 years 2 months ago
Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework
Abstract. Analysis of privacy-sensitive data in a multi-party environment often assumes that the parties are well-behaved and they abide by the protocols. Parties compute whatever ...
Hillol Kargupta, Kamalika Das, Kun Liu