Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
— Consider a scenario in which the data owner has some private/sensitive data and wants a data miner to access it for studying important patterns without revealing the sensitive ...
Kanishka Bhaduri, Mark D. Stefanski, Ashok N. Sriv...