Sciweavers

188 search results - page 22 / 38
» Quantification of a Privacy Preserving Data Mining Transform...
Sort
View
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 3 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDE
2010
IEEE
214views Database» more  ICDE 2010»
16 years 1 months ago
Differential Privacy via Wavelet Transforms
Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, -differential privacy provides one of the strongest p...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
ICDE
2007
IEEE
123views Database» more  ICDE 2007»
15 years 8 months ago
Privacy Preserving Pattern Discovery in Distributed Time Series
The search for unknown frequent pattern is one of the core activities in many time series data mining processes. In this paper we present an extension of the pattern discovery pro...
Josenildo Costa da Silva, Matthias Klusch
SIGMOD
2010
ACM
274views Database» more  SIGMOD 2010»
15 years 6 months ago
K-isomorphism: privacy preserving network publication against structural attacks
Serious concerns on privacy protection in social networks have been raised in recent years; however, research in this area is still in its infancy. The problem is challenging due ...
James Cheng, Ada Wai-Chee Fu, Jia Liu
AUSDM
2006
Springer
157views Data Mining» more  AUSDM 2006»
15 years 5 months ago
Safely Delegating Data Mining Tasks
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Ling Qiu, Kok-Leong Ong, Siu Man Lui