Sciweavers

79 search results - page 7 / 16
» On the Privacy Preserving Properties of Random Data Perturba...
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 9 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
ICDE
2008
IEEE
177views Database» more  ICDE 2008»
15 years 11 months ago
On Anti-Corruption Privacy Preserving Publication
This paper deals with a new type of privacy threat, called "corruption", in anonymized data publication. Specifically, an adversary is said to have corrupted some individ...
Yufei Tao, Xiaokui Xiao, Jiexing Li, Donghui Zhang
ICDE
2007
IEEE
115views Database» more  ICDE 2007»
15 years 11 months ago
Preservation Of Patterns and Input-Output Privacy
Abstract breaches. To do so, the data custodian needs to transform its data. To determine the appropriate transforPrivacy preserving data mining so far has mainly mation, there are...
Shaofeng Bu, Laks V. S. Lakshmanan, Raymond T. Ng,...
ACSW
2004
14 years 11 months ago
A Framework for Privacy Preserving Classification in Data Mining
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
Zahidul Islam, Ljiljana Brankovic
PERCOM
2009
ACM
15 years 4 months ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu