With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Privacy-preserving data mining has concentrated on obtaining valid results when the input data is private. An extreme example is Secure Multiparty Computation-based methods, where...
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
This report summarizes the events of the 2nd International Workshop on Privacy, Security, and Trust in KDD, at the 14th ACM SIGKDD International Conference on Knowledge Discovery ...
Francesco Bonchi, Elena Ferrari, Wei Jiang, Bradle...