Sciweavers

3651 search results - page 7 / 731
» Data Mining for Security Applications
Sort
View
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 4 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
SAC
2006
ACM
15 years 4 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
15 years 10 months ago
Is there a grand challenge or X-prize for data mining?
This panel will discuss possible exciting and motivating Grand Challenge problems for Data Mining, focusing on bioinformatics, multimedia mining, link mining, text mining, and web...
Gregory Piatetsky-Shapiro, Robert Grossman, Chaban...
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
15 years 10 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao
CIKM
2009
Springer
15 years 4 months ago
Walking in the crowd: anonymizing trajectory data for pattern analysis
Recently, trajectory data mining has received a lot of attention in both the industry and the academic research. In this paper, we study the privacy threats in trajectory data pub...
Noman Mohammed, Benjamin C. M. Fung, Mourad Debbab...