Sciweavers

251 search results - page 33 / 51
» On privacy preservation against adversarial data mining
Sort
View
ICDM
2006
IEEE
131views Data Mining» more  ICDM 2006»
14 years 1 months ago
Transforming Semi-Honest Protocols to Ensure Accountability
The secure multi-party computation (SMC) model provides means for balancing the use and confidentiality of distributed data. This is especially important in the field of privacy...
Wei Jiang, Chris Clifton
CIKM
2009
Springer
14 years 2 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
TDP
2010
140views more  TDP 2010»
13 years 2 months ago
Movement Data Anonymity through Generalization
In recent years, spatio-temporal and moving objects databases have gained considerable interest, due to the diffusion of mobile devices (e.g., mobile phones, RFID devices and GPS ...
Anna Monreale, Gennady L. Andrienko, Natalia V. An...
ESORICS
2004
Springer
14 years 1 months ago
Towards a Theory of Data Entanglement: (Extended Abstract)
d Abstract) James Aspnes , Joan Feigenbaum , Aleksandr Yampolskiy † , and Sheng Zhong ‡ Department of Computer Science, Yale University, New Haven CT 06520-8285, USA Abstract. ...
James Aspnes, Joan Feigenbaum, Aleksandr Yampolski...
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
14 years 9 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal