Sciweavers

311 search results - page 54 / 63
» Privacy-Preserving Data Imputation
Sort
View
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 4 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
ESANN
2008
13 years 9 months ago
K-nearest neighbours based on mutual information for incomplete data classification
Incomplete data is a common drawback that machine learning techniques need to deal with when solving real-life classification tasks. One of the most popular procedures for solving ...
Pedro J. García-Laencina, José-Luis ...
NIPS
2001
13 years 8 months ago
Speech Recognition with Missing Data using Recurrent Neural Nets
In the `missing data' approach to improving the robustness of automatic speech recognition to added noise, an initial process identifies spectraltemporal regions which are do...
S. Parveen, P. Green
WEBI
2009
Springer
14 years 2 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
SACMAT
2005
ACM
14 years 1 months ago
Purpose based access control of complex data for privacy protection
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
Ji-Won Byun, Elisa Bertino, Ninghui Li