Sciweavers

387 search results - page 3 / 78
» Data mining with differential privacy
Sort
View
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 1 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
SIGMOD
2010
ACM
236views Database» more  SIGMOD 2010»
15 years 2 months ago
Differentially private aggregation of distributed time-series with transformation and encryption
We propose PASTE, the first differentially private aggregation algorithms for distributed time-series data that offer good practical utility without any trusted server. PASTE add...
Vibhor Rastogi, Suman Nath
PSD
2010
Springer
167views Database» more  PSD 2010»
14 years 8 months ago
Does Differential Privacy Protect Terry Gross' Privacy?
The concept of differential privacy was motivated through the example of Terry Gross’ height in Dwork (2006). In this paper, we show that when a procedure based on differential p...
Krishnamurty Muralidhar, Rathindra Sarathy
PKDD
2004
Springer
109views Data Mining» more  PKDD 2004»
15 years 3 months ago
Data Privacy
Rakesh Agrawal
60
Voted
KDD
2008
ACM
143views Data Mining» more  KDD 2008»
15 years 10 months ago
Detecting privacy leaks using corpus-based association rules
Richard Chow, Philippe Golle, Jessica Staddon