Sciweavers

503 search results - page 38 / 101
» Output privacy in data mining
Sort
View
ADMA
2006
Springer
137views Data Mining» more  ADMA 2006»
15 years 1 months ago
SA-IFIM: Incrementally Mining Frequent Itemsets in Update Distorted Databases
Abstract. The issue of maintaining privacy in frequent itemset mining has attracted considerable attentions. In most of those works, only distorted data are available which may bri...
Jinlong Wang, Congfu Xu, Hongwei Dan, Yunhe Pan
COMPSAC
2004
IEEE
15 years 1 months ago
Hiding Sensitive Patterns in Association Rules Mining
Data mining techniques have been developed in many applications. However, it also causes a threat to privacy. We investigate to find an appropriate balance between a need for priv...
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen
COMPSAC
2005
IEEE
14 years 12 months ago
A Novel Method for Protecting Sensitive Knowledge in Association Rules Mining
Discovering frequent patterns from huge amounts of data is one of the most studied problems in data mining. However, some sensitive patterns with security policies may cause a thr...
En Tzu Wang, Guanling Lee, Yu Tzu Lin
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
15 years 2 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 4 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright