It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming selfselected communities around shared sensory data ...
Nam Pham, Raghu K. Ganti, Yusuf S. Uddin, Suman Na...
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Nowadays organizations all over the world are dependent on mining gigantic datasets. These datasets typically contain delicate individual information, which inevitably gets expose...
It is not surprising that there is strong interest in kNN queries to enable clustering, classification and outlierdetection tasks. However, previous approaches to privacypreservi...