Sciweavers

207 search results - page 22 / 42
» Limiting privacy breaches in privacy preserving data mining
Sort
View
ICDM
2007
IEEE
138views Data Mining» more  ICDM 2007»
15 years 3 months ago
Preserving Privacy through Data Generation
Many databases will not or can not be disclosed without strong guarantees that no sensitive information can be extracted. To address this concern several data perturbation techniq...
Jilles Vreeken, Matthijs van Leeuwen, Arno Siebes
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 6 months ago
Privacy-Preserving k-NN for Small and Large Data Sets
It is not surprising that there is strong interest in kNN queries to enable clustering, classification and outlierdetection tasks. However, previous approaches to privacypreservi...
Artak Amirbekyan, Vladimir Estivill-Castro
TDP
2010
166views more  TDP 2010»
14 years 6 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
15 years 6 months ago
Differential Privacy for Clinical Trial Data: Preliminary Evaluations
—The concept of differential privacy as a rigorous definition of privacy has emerged from the cryptographic community. However, further careful evaluation is needed before we ca...
Duy Vu, Aleksandra Slavkovic
ICDM
2003
IEEE
142views Data Mining» more  ICDM 2003»
15 years 5 months ago
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
Collaborative Filtering (CF) techniques are becoming increasingly popular with the evolution of the Internet. E-commerce sites use CF systems to suggest products to customers base...
Huseyin Polat, Wenliang Du