Sciweavers

2705 search results - page 34 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
WSDM
2012
ACM
352views Data Mining» more  WSDM 2012»
12 years 3 months ago
Multi-relational matrix factorization using bayesian personalized ranking for social network data
A key element of the social networks on the internet such as Facebook and Flickr is that they encourage users to create connections between themselves, other users and objects. On...
Artus Krohn-Grimberghe, Lucas Drumond, Christoph F...
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 8 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
13 years 5 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
13 years 11 months ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...
INDOCRYPT
2004
Springer
14 years 1 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora