Sciweavers

38 search results - page 5 / 8
» Preservation Of Patterns and Input-Output Privacy
Sort
View
MDM
2007
Springer
106views Communications» more  MDM 2007»
14 years 3 months ago
Protecting Moving Trajectories with Dummies
Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Tun-Hao You, Wen-Chih Peng, Wang-Chien Lee
CIKM
2009
Springer
14 years 4 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...
WWW
2007
ACM
14 years 10 months ago
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
In a social network, nodes correspond to people or other social entities, and edges correspond to social links between them. In an effort to preserve privacy, the practice of anon...
Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg
PODS
2011
ACM
229views Database» more  PODS 2011»
13 years 13 days ago
On the complexity of privacy-preserving complex event processing
Complex Event Processing (CEP) Systems are stream processing systems that monitor incoming event streams in search of userspecified event patterns. While CEP systems have been ad...
Yeye He, Siddharth Barman, Di Wang, Jeffrey F. Nau...
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
14 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...