Sciweavers

446 search results - page 28 / 90
» Randomization in Privacy-Preserving Data Mining
Sort
View
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
14 years 4 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...
ICDM
2010
IEEE
150views Data Mining» more  ICDM 2010»
13 years 7 months ago
Probabilistic Inference Protection on Anonymized Data
Background knowledge is an important factor in privacy preserving data publishing. Probabilistic distributionbased background knowledge is a powerful kind of background knowledge w...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Y...
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
14 years 10 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
14 years 7 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
SDM
2004
SIAM
177views Data Mining» more  SDM 2004»
13 years 11 months ago
Reservoir-Based Random Sampling with Replacement from Data Stream
Byung-Hoon Park, George Ostrouchov, Nagiza F. Sama...