Sciweavers

110 search results - page 17 / 22
» On the use of spectral filtering for privacy preserving data...
Sort
View
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 10 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
CSE
2009
IEEE
13 years 11 months ago
Mining Mobility Behavior from Trajectory Data
The technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes o...
Fosca Giannotti, Mirco Nanni, Dino Pedreschi, Chia...
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
14 years 1 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
ICDE
2008
IEEE
498views Database» more  ICDE 2008»
15 years 10 months ago
Injector: Mining Background Knowledge for Data Anonymization
Existing work on privacy-preserving data publishing cannot satisfactorily prevent an adversary with background knowledge from learning important sensitive information. The main cha...
Tiancheng Li, Ninghui Li
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 5 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang