Sciweavers

3651 search results - page 29 / 731
» Data Mining for Security Applications
Sort
View
83
Voted
DOLAP
2004
ACM
15 years 3 months ago
Cardinality-based inference control in OLAP systems: an information theoretic approach
We address the inference control problem in data cubes with some data known to users through external knowledge. The goal of inference controls is to prevent exact values of sensi...
Nan Zhang 0004, Wei Zhao, Jianer Chen
DGO
2003
202views Education» more  DGO 2003»
14 years 11 months ago
Crime Data Mining: An Overview and Case Studies
The concern about national security has increased significantly since the 9/11 attacks. However, information overload hinders the effective analysis of criminal and terrorist activ...
Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau...
97
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
15 years 10 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
IJIT
2004
14 years 11 months ago
Application of Neural Networks in Financial Data Mining
This paper deals with the application of a well-known neural network technique, multi-layer back-propagation (BP) neural network, in financial data mining. A modified neural networ...
Defu Zhang, Qingshan Jiang, Xin Li
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 7 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han