Sciweavers

337 search results - page 14 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
WPES
2003
ACM
14 years 2 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
GIS
2008
ACM
14 years 10 months ago
Privacy: preserving trajectory collection
In order to provide context?aware Location?Based Services, real location data of mobile users must be collected and analyzed by spatio?temporal data mining methods. However, the d...
Gyözö Gidófalvi, Torben Bach Pede...
KDD
2004
ACM
132views Data Mining» more  KDD 2004»
14 years 9 months ago
Privacy preserving regression modelling via distributed computation
Reluctance of data owners to share their possibly confidential or proprietary data with others who own related databases is a serious impediment to conducting a mutually beneficia...
Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerom...
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 9 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
DMKD
2004
ACM
136views Data Mining» more  DMKD 2004»
14 years 2 months ago
Mining association rules with non-uniform privacy concerns
Privacy concerns have become an important issue in data mining. A popular way to preserve privacy is to randomize the dataset to be mined in a systematic way and mine the randomiz...
Yi Xia, Yirong Yang, Yun Chi