Sciweavers

455 search results - page 15 / 91
» Differential Privacy in New Settings
Sort
View
WWW
2008
ACM
15 years 10 months ago
Setting Access Permission through Transitive Relationship in Web-based Social Networks
The rising popularity of Web 2.0, such as blogs, forums, online calendars/diaries, etc., makes users more interested in keeping their data on the Web. Sharing of such data could m...
Dan Hong, Vincent Y. Shen
EDBT
2008
ACM
172views Database» more  EDBT 2008»
15 years 9 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
ASIACRYPT
2005
Springer
15 years 3 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
BMCBI
2004
135views more  BMCBI 2004»
14 years 9 months ago
Determination of the differentially expressed genes in microarray experiments using local FDR
Background: Thousands of genes in a genomewide data set are tested against some null hypothesis, for detecting differentially expressed genes in microarray experiments. The expect...
Julie Aubert, Avner Bar-Hen, Jean-Jacques Daudin, ...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 4 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...