Sciweavers

5255 search results - page 165 / 1051
» Formal Methods for Privacy
Sort
View
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 5 months ago
Preserving Privacy in Social Networks Against Neighborhood Attacks
Recently, as more and more social network data has been published in one way or another, preserving privacy in publishing social network data becomes an important concern. With som...
Bin Zhou 0002, Jian Pei
169
Voted
EDBT
2004
ACM
234views Database» more  EDBT 2004»
16 years 3 months ago
A Condensation Approach to Privacy Preserving Data Mining
In recent years, privacy preserving data mining has become an important problem because of the large amount of personal data which is tracked by many business applications. In many...
Charu C. Aggarwal, Philip S. Yu
139
Voted
EDBT
2008
ACM
172views Database» more  EDBT 2008»
16 years 3 months ago
Distributed privacy preserving k-means clustering with additive secret sharing
Recent concerns about privacy issues motivated data mining researchers to develop methods for performing data mining while preserving the privacy of individuals. However, the curr...
Albert Levi, Erkay Savas, Mahir Can Doganay, Thoma...
111
Voted
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
15 years 10 months ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
116
Voted
KDD
2010
ACM
194views Data Mining» more  KDD 2010»
15 years 7 months ago
Versatile publishing for privacy preservation
Motivated by the insufficiency of the existing quasi-identifier/sensitiveattribute (QI-SA) framework on modeling real-world privacy requirements for data publishing, we propose ...
Xin Jin, Mingyang Zhang, Nan Zhang 0004, Gautam Da...