Sciweavers

120 search results - page 18 / 24
» Privacy Preserving Market Basket Data Analysis
Sort
View
SIGMOD
2005
ACM
128views Database» more  SIGMOD 2005»
15 years 9 months ago
Deriving Private Information from Randomized Data
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
Zhengli Huang, Wenliang Du, Biao Chen
BMCBI
2006
114views more  BMCBI 2006»
14 years 9 months ago
Mining frequent patterns for AMP-activated protein kinase regulation on skeletal muscle
Background: AMP-activated protein kinase (AMPK) has emerged as a significant signaling intermediary that regulates metabolisms in response to energy demand and supply. An investig...
Qingfeng Chen, Yi-Ping Phoebe Chen
SDM
2009
SIAM
113views Data Mining» more  SDM 2009»
15 years 6 months ago
Graph Generation with Prescribed Feature Constraints.
In this paper, we study the problem of how to generate synthetic graphs matching various properties of a real social network with two applications, privacy preserving social netwo...
Xiaowei Ying, Xintao Wu
NDSS
2008
IEEE
15 years 3 months ago
Analyzing Privacy in Enterprise Packet Trace Anonymization
Accurate network measurement through trace collection is critical for advancing network design and for maintaining secure, reliable networks. Unfortunately, the release of network...
Bruno F. Ribeiro, Weifeng Chen, Gerome Miklau, Don...
EDBT
2010
ACM
237views Database» more  EDBT 2010»
15 years 4 months ago
BronzeGate: real-time transactional data obfuscation for GoldenGate
Data privacy laws have appeared recently, such as the HIPAA laws for protecting medical records, and the PCI guidelines for protecting Credit Card information. Data privacy can be...
Shenoda Guirguis, Alok Pareek