Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Privacy Preserving Data Mining
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Building decision tree classifier on private data
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Assuring privacy when big brother is watching
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy Preserving Association Rule Mining
RIDE '02 Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02)
Protecting Sensitive Knowledge By Data Sanitization
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving Distributed Clustering using Generative Models
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
IEEE Transactions on Knowledge and Data Engineering
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
A Framework for Evaluating Privacy Preserving Data Mining Algorithms*
Data Mining and Knowledge Discovery
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Distributed clustering based on sampling local density estimates
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Hiding classification rules for data sharing with privacy preservation
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving collaborative association rule mining
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Unsupervised Classifier Selection Based on Two-Sample Test
DS '08 Proceedings of the 11th International Conference on Discovery Science
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.00 |
Recent advances in the Internet, in data mining, and in security technologies have gave rise to a new stream of research, known as privacy preserving data mining (PPDM). PPDM technologies allow us to extract relevant knowledge from a large amount of data, while hide sensitive data or information from disclosure. Several research questions have often being asked: (1) what kind of option available for privacy preserving? (2) Which method is more popular? (3) how to measure the performance of these algorithms? And (4) how effective of these algorithms in preserving privacy? To help answer these questions, we conduct an extensive review of 29 recent references from years 2000 to 2006 for analysis.