Sciweavers

503 search results - page 1 / 101
» Output privacy in data mining
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
14 years 7 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 13 days ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
TODS
2011
37views more  TODS 2011»
13 years 21 days ago
Output privacy in data mining
Ting Wang, Ling Liu
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
14 years 7 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
14 years 6 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff