Sciweavers

22 search results - page 2 / 5
» Preservation of proximity privacy in publishing numerical se...
Sort
View
ICDM
2008
IEEE
95views Data Mining» more  ICDM 2008»
13 years 11 months ago
Publishing Sensitive Transactions for Itemset Utility
We consider the problem of publishing sensitive transaction data with privacy preservation. High dimensionality of transaction data poses unique challenges on data privacy and dat...
Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Che...
ICDE
2010
IEEE
194views Database» more  ICDE 2010»
14 years 4 months ago
XColor: Protecting General Proximity Privacy
As a severe threat in anonymized data publication, proximity breach is gaining increasing attention. Such breach occurs when an attacker learns with high confidence that the sensit...
Ting Wang, Ling Liu
SDM
2009
SIAM
331views Data Mining» more  SDM 2009»
14 years 2 months ago
Privacy Preservation in Social Networks with Sensitive Edge Weights.
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of con...
Jie Wang, Jinze Liu, Jun Zhang, Lian Liu
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
14 years 6 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
PVLDB
2010
95views more  PVLDB 2010»
13 years 3 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang