Sciweavers

1005 search results - page 27 / 201
» Privacy Preserving Clustering
Sort
View
SIGMOD
2009
ACM
137views Database» more  SIGMOD 2009»
14 years 10 months ago
Privacy preservation of aggregates in hidden databases: why and how?
Many websites provide form-like interfaces which allow users to execute search queries on the underlying hidden databases. In this paper, we explain the importance of protecting s...
Arjun Dasgupta, Nan Zhang, Gautam Das, Surajit Cha...
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
14 years 4 months ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng
LCN
2006
IEEE
14 years 3 months ago
Privacy-Preserving Quick Authentication in Fast Roaming Networks
Vehicular networks will become an important component for information accesses in one’s daily life. A vehicular network provides a vehicular user not only chances to communicate...
Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
NDSS
2005
IEEE
14 years 3 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
14 years 3 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du