Towards identity anonymization on graphs
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Hiding Predictive Association Rules on Horizontally Distributed Data
IEA/AIE '09 Proceedings of the 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Next-Generation Applied Intelligence
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Discovering Patterns in Flows: A Privacy Preserving Approach with the ACSM Prototype
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Hiding collaborative recommendation association rules on horizontally partitioned data
Intelligent Data Analysis
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Privacy preserving linear discriminant analysis from perturbed data
Proceedings of the 2010 ACM Symposium on Applied Computing
Collusion-resistant privacy-preserving data mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
IDEAL'10 Proceedings of the 11th international conference on Intelligent data engineering and automated learning
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
The Role of Ontologies in the Anonymization of Textual Variables
Proceedings of the 2010 conference on Artificial Intelligence Research and Development: Proceedings of the 13th International Conference of the Catalan Association for Artificial Intelligence
Fuzzy based clustering algorithm for privacy preserving data mining
International Journal of Business Information Systems
Proceedings of the 14th International Conference on Database Theory
Verification of data pattern for interactive privacy preservation model
Proceedings of the 2011 ACM Symposium on Applied Computing
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Seat usage data analysis and its application for library marketing
ACIIDS'11 Proceedings of the Third international conference on Intelligent information and database systems - Volume Part I
Edit constraints on microaggregation and additive noise
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
C-safety: a framework for the anonymization of semantic trajectories
Transactions on Data Privacy
Revisiting sequential pattern hiding to enhance utility
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Testing software in age of data privacy: a balancing act
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part I
An efficient cacheable secure scalar product protocol for privacy-preserving data mining
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Protecting privacy of sensitive value distributions in data release
STM'10 Proceedings of the 6th international conference on Security and trust management
A publication process model to enable privacy-aware data sharing
IBM Journal of Research and Development
Privacy protected knowledge management in services with emphasis on quality data
Proceedings of the 20th ACM international conference on Information and knowledge management
Mining frequent patterns across multiple data streams
Proceedings of the 20th ACM international conference on Information and knowledge management
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Utility-preserving transaction data anonymization with low information loss
Expert Systems with Applications: An International Journal
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
Inference-Proof view update transactions with minimal refusals
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Limiting link disclosure in social network analysis through subgraph-wise perturbation
Proceedings of the 15th International Conference on Extending Database Technology
Statistical Analysis and Data Mining
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
Reconstruction attack through classifier analysis
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Fairness-Aware classifier with prejudice remover regularizer
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Supervised patient similarity measure of heterogeneous patient records
ACM SIGKDD Explorations Newsletter
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security
Clustering-based categorical data protection
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part I
Specialization in i* strategic rationale diagrams
ER'12 Proceedings of the 31st international conference on Conceptual Modeling
International Journal of Data Warehousing and Mining
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
On Learning Cluster Coefficient of Private Networks
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Improving search result summaries by using searcher behavior data
Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval
Secure k-NN computation on encrypted cloud data without sharing key with query users
Proceedings of the 2013 international workshop on Security in cloud computing
Mining frequent graph patterns with differential privacy
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
When private set intersection meets big data: an efficient and scalable protocol
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Coopetitive data warehouse: a case study
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Journal of Supercomputing
Secure k-NN query on encrypted cloud database without key-sharing
International Journal of Electronic Security and Digital Forensics
Distributed and Parallel Databases
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Hi-index | 0.00 |
Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy-Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for data sharing, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the key research content as well as future research directions. Privacy-Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science, and is also suitable for industry practitioners.