Sciweavers

224 search results - page 5 / 45
» Interactive anonymization of sensitive data
Sort
View
PAKDD
2009
ACM
134views Data Mining» more  PAKDD 2009»
14 years 7 months ago
On Link Privacy in Randomizing Social Networks.
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Xiaowei Ying, Xintao Wu
ICDM
2010
IEEE
142views Data Mining» more  ICDM 2010»
13 years 8 months ago
Anonymizing Temporal Data
-- Temporal data are time-critical in that the snapshot at each timestamp must be made available to researchers in a timely fashion. However, due to the limited data, each snapshot...
Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-C...
SDM
2008
SIAM
164views Data Mining» more  SDM 2008»
13 years 11 months ago
Randomizing Social Networks: a Spectrum Preserving Approach
Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. The nodes in the network are the individuals and...
Xiaowei Ying, Xintao Wu
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 10 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 11 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...