Sciweavers

251 search results - page 27 / 51
» On privacy preservation against adversarial data mining
Sort
View
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
14 years 1 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 9 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
CCS
2008
ACM
13 years 9 months ago
Controlled privacy preserving keyword search
Data sharing on public servers has become a popular service on the Internet, in which users can store and share data with other users through public servers. However, because the ...
Stephen S. Yau, Yin Yin
VLDB
2002
ACM
123views Database» more  VLDB 2002»
13 years 7 months ago
Maintaining Data Privacy in Association Rule Mining
Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. We investigate here,...
Shariq Rizvi, Jayant R. Haritsa
IEEESP
2010
101views more  IEEESP 2010»
13 years 6 months ago
Preserving Privacy Based on Semantic Policy Tools
Abstract—Private data of individuals is constantly being collected, analyzed, and stored by different kinds of organizations: shopping sites to provide better service and recomme...
Lalana Kagal, Joe Pato