Sciweavers

311 search results - page 56 / 63
» Privacy-Preserving Data Imputation
Sort
View
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
14 years 8 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
PERCOM
2011
ACM
12 years 11 months ago
Towards preserving privacy in participatory sensing
Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Leyla Kazemi, Cyrus Shahabi
ICPR
2010
IEEE
13 years 10 months ago
Underwater Mine Classification with Imperfect Labels
A new algorithm for performing classification with imperfectly labeled data is presented. The proposed approach is motivated by the insight that the average prediction of a group ...
David Williams
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 8 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
IEEEIAS
2007
IEEE
14 years 1 months ago
A Purpose-Based Access Control Model
: Achieving privacy preservation in a data-sharing computing environment is becoming a challenging problem. Some organisations may have published privacy policies, which promise pr...
Naikuo Yang, Howard Barringer, Ning Zhang