Sciweavers

325 search results - page 4 / 65
» Privacy-preserving data mashup
Sort
View
CORR
2008
Springer
159views Education» more  CORR 2008»
13 years 7 months ago
Privacy Preserving ID3 over Horizontally, Vertically and Grid Partitioned Data
We consider privacy preserving decision tree induction via ID3 in the case where the training data is horizontally or vertically distributed. Furthermore, we consider the same pro...
Bart Kuijpers, Vanessa Lemmens, Bart Moelans, Karl...
PAKDD
2005
ACM
115views Data Mining» more  PAKDD 2005»
14 years 18 days ago
Performance Measurements for Privacy Preserving Data Mining
Abstract. This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy ...
Nan Zhang 0004, Wei Zhao, Jianer Chen
ICCS
2005
Springer
14 years 18 days ago
Hierarchical Infrastructure for Large-Scale Distributed Privacy-Preserving Data Mining
Abstract. Data Mining is often required to be performed among a number of groups of sites, where the precondition is that no privacy of any site should be leaked out to other sites...
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 1 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
DAMON
2006
Springer
13 years 10 months ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...