Sciweavers

69 search results - page 11 / 14
» Cryptographic Techniques for Privacy-Preserving Data Mining
Sort
View
DAWAK
2006
Springer
13 years 11 months ago
Two New Techniques for Hiding Sensitive Itemsets and Their Empirical Evaluation
Many privacy preserving data mining algorithms attempt to selectively hide what database owners consider as sensitive. Specifically, in the association-rules domain, many of these ...
Ahmed HajYasien, Vladimir Estivill-Castro
VLDB
2005
ACM
136views Database» more  VLDB 2005»
14 years 29 days ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 8 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
CASCON
2004
129views Education» more  CASCON 2004»
13 years 9 months ago
Building predictors from vertically distributed data
Due in part to the large volume of data available today, but more importantly to privacy concerns, data are often distributed across institutional, geographical and organizational...
Sabine M. McConnell, David B. Skillicorn