Sciweavers

54 search results - page 6 / 11
» Private record matching using differential privacy
Sort
View
SAC
2005
ACM
13 years 11 months ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
13 years 10 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
ICDT
2011
ACM
213views Database» more  ICDT 2011»
12 years 9 months ago
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording information about the module executions used to produce a data item, as well as the parame...
Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Ju...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
13 years 11 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain
ICDM
2008
IEEE
130views Data Mining» more  ICDM 2008»
14 years 18 days ago
Inference Analysis in Privacy-Preserving Data Re-publishing
Privacy-Preserving Data Re-publishing (PPDR) deals with publishing microdata in dynamic scenarios. Due to privacy concerns, data must be disguised before being published. Research...
Guan Wang, Zutao Zhu, Wenliang Du, Zhouxuan Teng