Sciweavers

1005 search results - page 26 / 201
» Privacy Preserving Clustering
Sort
View
ICDE
2006
IEEE
275views Database» more  ICDE 2006»
14 years 11 months ago
Privacy Preserving Query Processing Using Third Parties
Data integration from multiple autonomous data sources has emerged as an important practical problem. The key requirement for such data integration is that owners of such data nee...
Amr El Abbadi, Aziz Gulbeden, Divyakant Agrawal, F...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
IPTPS
2004
Springer
14 years 3 months ago
Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting
Abstract— Content sharing is a popular usage of peerto-peer systems for its inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-to-pe...
Helen J. Wang, Yih-Chun Hu, Chun Yuan, Zheng Zhang...
INFOCOM
2011
IEEE
13 years 1 months ago
A distributed and privacy preserving algorithm for identifying information hubs in social networks
—This paper addresses the problem of identifying the top-k information hubs in a social network. Identifying topk information hubs is crucial for many applications such as advert...
Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex...
ICDE
2008
IEEE
157views Database» more  ICDE 2008»
14 years 11 months ago
OptRR: Optimizing Randomized Response Schemes for Privacy-Preserving Data Mining
The randomized response (RR) technique is a promising technique to disguise private categorical data in Privacy-Preserving Data Mining (PPDM). Although a number of RR-based methods...
Zhengli Huang, Wenliang Du