Sciweavers

207 search results - page 18 / 42
» Limiting privacy breaches in privacy preserving data mining
Sort
View
ICDE
2006
IEEE
144views Database» more  ICDE 2006»
15 years 5 months ago
PRIVATE-IYE: A Framework for Privacy Preserving Data Integration
Data integration has been a long standing challenge to the database and data mining communities. This need has become critical in numerous contexts, including building e-commerce ...
Sourav S. Bhowmick, Le Gruenwald, Mizuho Iwaihara,...
KDD
2007
ACM
142views Data Mining» more  KDD 2007»
16 years 3 days ago
Towards Privacy-Preserving Model Selection
Abstract. Model selection is an important problem in statistics, machine learning, and data mining. In this paper, we investigate the problem of enabling multiple parties to perfor...
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
CIKM
2006
Springer
15 years 3 months ago
Privacy preserving sequential pattern mining in distributed databases
Research in the areas of privacy preserving techniques in databases and subsequently in privacy enhancement technologies have witnessed an explosive growth-spurt in recent years. ...
Vishal Kapoor, Pascal Poncelet, François Tr...
ICDM
2009
IEEE
172views Data Mining» more  ICDM 2009»
15 years 6 months ago
Fine-Grain Perturbation for Privacy Preserving Data Publishing
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...
Rhonda Chaytor, Ke Wang, Patricia Brantingham
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 7 days ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng