Sciweavers

251 search results - page 28 / 51
» On privacy preservation against adversarial data mining
Sort
View
STOC
2009
ACM
112views Algorithms» more  STOC 2009»
14 years 8 months ago
A new approach to auctions and resilient mechanism design
We put forward a new approach to mechanism design, and exemplify it via a new mechanism guaranteeing significant revenue in unrestricted combinatorial auctions. Our mechanism ? su...
Jing Chen, Silvio Micali
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
14 years 1 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
ACSAC
2005
IEEE
14 years 1 months ago
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach
With the increasing security threats from infrastructure attacks such as worms and distributed denial of service attacks, it is clear that the cooperation among different organiza...
Dingbang Xu, Peng Ning
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
13 years 11 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 4 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu