Sciweavers

503 search results - page 19 / 101
» Output privacy in data mining
Sort
View
DMKD
2003
ACM
151views Data Mining» more  DMKD 2003»
15 years 3 months ago
Assuring privacy when big brother is watching
Homeland security measures are increasing the amount of data collected, processed and mined. At the same time, owners of the data raised legitimate concern about their privacy and...
Murat Kantarcioglu, Chris Clifton
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
15 years 10 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
EDBTW
2010
Springer
15 years 4 months ago
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the data for legitimate users. Quantifying the trade-...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
PKDD
2010
Springer
160views Data Mining» more  PKDD 2010»
14 years 8 months ago
Entropy and Margin Maximization for Structured Output Learning
Abstract. We consider the problem of training discriminative structured output predictors, such as conditional random fields (CRFs) and structured support vector machines (SSVMs)....
Patrick Pletscher, Cheng Soon Ong, Joachim M. Buhm...