Sciweavers

4 search results - page 1 / 1
» Inference Attacks in Peer-to-Peer Homogeneous Distributed Da...
Sort
View
ECAI
2004
Springer
13 years 10 months ago
Inference Attacks in Peer-to-Peer Homogeneous Distributed Data Mining
Spontaneous formation of peer-to-peer agent-based data mining systems seems a plausible scenario in years to come. However, the emergence of peer-to-peer environments further exace...
Josenildo Costa da Silva, Matthias Klusch, Stefano...
ICDE
2006
IEEE
176views Database» more  ICDE 2006»
13 years 10 months ago
Deriving Private Information from Perturbed Data Using IQR Based Approach
Several randomized techniques have been proposed for privacy preserving data mining of continuous data. These approaches generally attempt to hide the sensitive data by randomly m...
Songtao Guo, Xintao Wu, Yingjiu Li
VLDB
2005
ACM
136views Database» more  VLDB 2005»
13 years 10 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
13 years 6 months ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...