Sciweavers

337 search results - page 29 / 68
» A Condensation Approach to Privacy Preserving Data Mining
Sort
View
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 10 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
CCS
2008
ACM
13 years 10 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
ICDE
2007
IEEE
143views Database» more  ICDE 2007»
14 years 10 months ago
Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking
We address the problem of preserving privacy in streams, which has received surprisingly limited attention. For static data, a well-studied and widely used approach is based on ra...
Feifei Li, Jimeng Sun, Spiros Papadimitriou, Georg...
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 6 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
TDP
2008
96views more  TDP 2008»
13 years 8 months ago
Constrained Microaggregation: Adding Constraints for Data Editing
Privacy preserving data mining and statistical disclosure control have introduced several methods for data perturbation that can be used for ensuring the privacy of data respondent...
Vicenç Torra