Sciweavers

387 search results - page 31 / 78
» Data mining with differential privacy
Sort
View
KES
2008
Springer
14 years 9 months ago
Privacy Risks in Trajectory Data Publishing: Reconstructing Private Trajectories from Continuous Properties
Abstract. Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-proces...
Emre Kaplan, Thomas Brochmann Pedersen, Erkay Sava...
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 1 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 4 months ago
Privacy-Preserving k-NN for Small and Large Data Sets
It is not surprising that there is strong interest in kNN queries to enable clustering, classification and outlierdetection tasks. However, previous approaches to privacypreservi...
Artak Amirbekyan, Vladimir Estivill-Castro
KDD
2007
ACM
152views Data Mining» more  KDD 2007»
15 years 10 months ago
Privacy-Preserving Sharing of Horizontally-Distributed Private Data for Constructing Accurate Classifiers
Data mining tasks such as supervised classification can often benefit from a large training dataset. However, in many application domains, privacy concerns can hinder the construc...
Vincent Yan Fu Tan, See-Kiong Ng
JCP
2007
148views more  JCP 2007»
14 years 9 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy