Sciweavers

123 search results - page 4 / 25
» Injector: Mining Background Knowledge for Data Anonymization
Sort
View
SAC
2010
ACM
14 years 19 days ago
Background knowledge in formal concept analysis: constraints via closure operators
The aim of this short paper is to present a general method of using background knowledge to impose constraints in conceptual clustering of object-attribute relational data. The pr...
Radim Belohlávek, Vilém Vychodil
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
13 years 6 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
SIGMOD
2005
ACM
123views Database» more  SIGMOD 2005»
13 years 11 months ago
To Do or Not To Do: The Dilemma of Disclosing Anonymized Data
Decision makers of companies often face the dilemma of whether to release data for knowledge discovery, vis a vis the risk of disclosing proprietary or sensitive information. Whil...
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Rames...
KDD
2001
ACM
231views Data Mining» more  KDD 2001»
14 years 6 months ago
A Framework for Efficient and Anonymous Web Usage Mining Based on Client-Side Tracking
Web Usage Mining (WUM), a natural application of data mining techniques to the data collected from user interactions with the web, has greatly concerned both academia and industry ...
Cyrus Shahabi, Farnoush Banaei Kashani
ICDM
2009
IEEE
162views Data Mining» more  ICDM 2009»
13 years 3 months ago
Towards a Universal Text Classifier: Transfer Learning Using Encyclopedic Knowledge
Document classification is a key task for many text mining applications. However, traditional text classification requires labeled data to construct reliable and accurate classifie...
Pu Wang, Carlotta Domeniconi