Sciweavers

387 search results - page 51 / 78
» Data mining with differential privacy
Sort
View
ICMCS
2007
IEEE
138views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Differentiated Service Protection of Multimedia Transmission via Detection of Traffic Anomalies
Multimedia transmission over the Internet has its quality of service (QoS) requirement. However, Denial-of-Service (DoS) attacks launch large volumes of traffic and consume networ...
Hongli Luo, Mei-Ling Shyu
BMCBI
2008
158views more  BMCBI 2008»
14 years 10 months ago
Analyzing M-CSF dependent monocyte/macrophage differentiation: Expression modes and meta-modes derived from an independent compo
Background: The analysis of high-throughput gene expression data sets derived from microarray experiments still is a field of extensive investigation. Although new approaches and ...
Dominik Lutter, Peter Ugocsai, Margot Grandl, Evel...
PVLDB
2010
95views more  PVLDB 2010»
14 years 8 months ago
Small Domain Randomization: Same Privacy, More Utility
Random perturbation is a promising technique for privacy preserving data mining. It retains an original sensitive value with a certain probability and replaces it with a random va...
Rhonda Chaytor, Ke Wang
FSKD
2008
Springer
136views Fuzzy Logic» more  FSKD 2008»
14 years 11 months ago
k-Anonymity via Clustering Domain Knowledge for Privacy Preservation
Preservation of privacy in micro-data release is a challenging task in data mining. The k-anonymity method has attracted much attention of researchers. Quasiidentifier is a key co...
Taiyong Li, Changjie Tang, Jiang Wu, Qian Luo, She...
SDM
2009
SIAM
149views Data Mining» more  SDM 2009»
15 years 7 months ago
Speeding Up Secure Computations via Embedded Caching.
Most existing work on Privacy-Preserving Data Mining (PPDM) focus on enabling conventional data mining algorithms with the ability to run in a secure manner in a multi-party setti...
K. Zhai, W. K. Ng, A. R. Herianto, S. Han