Sciweavers

20 search results - page 1 / 4
» Private Multiparty Sampling and Approximation of Vector Comb...
Sort
View
ICALP
2007
Springer
13 years 10 months ago
Private Multiparty Sampling and Approximation of Vector Combinations
We consider the problem of private efficient data mining of vertically-partitioned databases. Each of several parties holds a column of a data matrix (a vector) and the parties wan...
Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecc...
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
13 years 5 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
14 years 4 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng
ICC
2007
IEEE
141views Communications» more  ICC 2007»
13 years 10 months ago
Accurate Classification of the Internet Traffic Based on the SVM Method
—The need to quickly and accurately classify Internet traffic for security and QoS control has been increasing significantly with the growing Internet traffic and applications ov...
Zhu Li, Ruixi Yuan, Xiaohong Guan
IACR
2011
87views more  IACR 2011»
12 years 4 months ago
Is privacy compatible with truthfulness?
In the area of privacy-preserving data mining, a differentially private mechanism intuitively encourages people to share their data truthfully because they are at little risk of ...
David Xiao