Sciweavers

503 search results - page 3 / 101
» Output privacy in data mining
Sort
View
125
Voted
SIGKDD
2002
172views more  SIGKDD 2002»
15 years 1 months ago
Data Mining, National Security, Privacy and Civil Liberties
In this paper, we describe the threats to privacy that can occur through data mining and then view the privacy problem as a variation of the inference problem in databases. Keywor...
Bhavani M. Thuraisingham
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 4 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
122
Voted
KDD
2010
ACM
232views Data Mining» more  KDD 2010»
15 years 5 months ago
Discovering frequent patterns in sensitive data
Discovering frequent patterns from data is a popular exploratory technique in data mining. However, if the data are sensitive (e.g. patient health records, user behavior records) ...
Raghav Bhaskar, Srivatsan Laxman, Adam Smith, Abhr...
125
Voted
PKDD
2009
Springer
164views Data Mining» more  PKDD 2009»
15 years 6 months ago
Efficient Decoding of Ternary Error-Correcting Output Codes for Multiclass Classification
Sang-Hyeun Park, Johannes Fürnkranz
87
Voted
PKDD
2004
Springer
109views Data Mining» more  PKDD 2004»
15 years 7 months ago
Data Privacy
Rakesh Agrawal