Sciweavers

58 search results - page 5 / 12
» Privacy Preserving Clustering by Data Transformation
Sort
View
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 1 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ICDT
2010
ACM
172views Database» more  ICDT 2010»
14 years 11 days ago
k-jump strategy for preserving privacy in micro-data disclosure
In disclosing micro-data with sensitive attributes, the goal is usually two fold. First, the data utility of disclosed data should be maximized for analysis purposes. Second, the ...
Wen Ming Liu, Lingyu Wang, Lei Zhang
ICDE
2010
IEEE
214views Database» more  ICDE 2010»
14 years 7 months ago
Differential Privacy via Wavelet Transforms
Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, -differential privacy provides one of the strongest p...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
WPES
2003
ACM
14 years 25 days ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...