Sciweavers

2705 search results - page 4 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 1 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
14 years 18 days ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...
ICDE
2009
IEEE
132views Database» more  ICDE 2009»
14 years 8 months ago
Using Anonymized Data for Classification
In recent years, anonymization methods have emerged as an important tool to preserve individual privacy when releasing privacy sensitive data sets. This interest in anonymization t...
Ali Inan, Murat Kantarcioglu, Elisa Bertino
ICDM
2009
IEEE
143views Data Mining» more  ICDM 2009»
14 years 27 days ago
An Attack on the Privacy of Sanitized Data that Fuses the Outputs of Multiple Data Miners
Abstract—Data sanitization has been used to restrict reidentification of individuals and disclosure of sensitive information from published data. We propose an attack on the pri...
Michal Sramka, Reihaneh Safavi-Naini, Jörg De...