A tree-based data perturbation approach for privacy-preserving data mining

被引:32
|
作者
IEEE Computer Society [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
IEEE Trans Knowl Data Eng | 2006年 / 9卷 / 1278-1283期
关键词
D O I
10.1109/TKDE.2006.136
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Privacy-Preserving Outsourcing of Data Mining
    Monreale, Anna
    Wang, Wendy Hui
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 583 - 588
  • [22] Study of privacy-preserving data mining
    Dai, Guangming
    Zhou, Xingeng
    Wang, Maocai
    2007 International Symposium on Computer Science & Technology, Proceedings, 2007, : 412 - 414
  • [23] Privacy-preserving Data Mining in Industry
    Kenthapadi, Krishnaram
    Mironov, Ilya
    Thakurta, Abhradeep Guha
    COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, : 1308 - 1310
  • [24] Privacy-preserving data-mining
    Grosskreutz H.
    Lemmen B.
    Rüping S.
    Informatik-Spektrum, 2010, 33 (04) : 380 - 383
  • [25] Privacy-preserving Data Mining in Industry
    Kenthapadi, Krishnaram
    Mironov, Ilya
    Thakurta, Abhradeep Guha
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 840 - 841
  • [26] Privacy-preserving collaborative data mining
    Zhan, Justin
    IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2008, 3 (02) : 31 - 41
  • [27] Privacy-preserving data mining systems
    Zhang, Nan
    Zhao, Wei
    COMPUTER, 2007, 40 (04) : 52 - +
  • [28] DATA MINING AS A TOOL IN PRIVACY-PRESERVING DATA PUBLISHING
    Sramka, Michal
    NILCRYPT 10, 2010, 45 : 151 - 159
  • [29] Privacy-Preserving Data Mining: A Game-Theoretic Approach
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 186 - 200
  • [30] Privacy-preserving data mining: A feature set partitioning approach
    Matatov, Nissim
    Rokach, Lior
    Maimon, Oded
    INFORMATION SCIENCES, 2010, 180 (14) : 2696 - 2720