Practical data-swapping: the first steps
ACM Transactions on Database Systems (TODS)
A data distortion by probability distribution
ACM Transactions on Database Systems (TODS)
Computers and security
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
C4.5: programs for machine learning
C4.5: programs for machine learning
Machine learning, neural and statistical classification
Machine learning, neural and statistical classification
Internet security: firewalls and beyond
Communications of the ACM
Quasi-cubes: exploiting approximations in multidimensional databases
ACM SIGMOD Record
Communications of the ACM
TRUSTe: an online privacy seal program
Communications of the ACM
Privacy interfaces for information management
Communications of the ACM
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
A security machanism for statistical database
ACM Transactions on Database Systems (TODS)
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
Cryptography and data security
Cryptography and data security
Computer
Design of LDV: A Multilevel Secure Relational Database Management
IEEE Transactions on Knowledge and Data Engineering
Privacy critics: UI components to safeguard users' privacy
CHI '99 Extended Abstracts on Human Factors in Computing Systems
SLIQ: A Fast Scalable Classifier for Data Mining
EDBT '96 Proceedings of the 5th International Conference on Extending Database Technology: Advances in Database Technology
An Interval Classifier for Database Mining Applications
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
SPRINT: A Scalable Parallel Classifier for Data Mining
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
An Analytic Approach to Statistical Databases
VLDB '83 Proceedings of the 9th International Conference on Very Large Data Bases
Recovering Information from Summary Data
VLDB '97 Proceedings of the 23rd International Conference on Very Large Data Bases
Privacy-enhancing technologies for the Internet
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Mining massively incomplete data sets by conceptual reconstruction
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Using unknowns to prevent discovery of association rules
ACM SIGMOD Record
Privacy-Oriented Data Mining by Proof Checking
PKDD '02 Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery
Data Mining Technologies for Digital Libraries and Web Information Systems
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
Secure Multiparty Computation of Approximations
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Local and Global Methods in Data Mining: Basic Techniques and Open Problems
ICALP '02 Proceedings of the 29th International Colloquium on Automata, Languages and Programming
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Data mining, national security, privacy and civil liberties
ACM SIGKDD Explorations Newsletter
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Transforming data to satisfy privacy constraints
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
SHOCK: communicating with computational messages and automatic private profiles
WWW '03 Proceedings of the 12th international conference on World Wide Web
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
A practical approach to solve Secure Multi-party Computation problems
Proceedings of the 2002 workshop on New security paradigms
Preface: proceedings of the ICDM 2002 workshop on privacy, security, and data mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Building decision tree classifier on private data
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
An architecture for privacy-preserving mining of client information
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Discussion paper: privacy-preserving distributed queries for a clinical case research network
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Privacy-Preserving Cooperative Scientific Computations
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Assuring privacy when big brother is watching
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
On the Use of Conceptual Reconstruction for Mining Massively Incomplete Data Sets
IEEE Transactions on Knowledge and Data Engineering
Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving Distributed Clustering using Generative Models
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Exploratory medical knowledge discovery: experiences and issues
ACM SIGKDD Explorations Newsletter
Rhythm modeling, visualizations and applications
Proceedings of the 16th annual ACM symposium on User interface software and technology
IEEE Transactions on Knowledge and Data Engineering
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
A framework for privacy preserving classification in data mining
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Detecting privacy and ethical sensitivity in data mining results
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Analysis of privacy preserving random perturbation techniques: further explorations
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy preserving database application testing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Mining association rules with non-uniform privacy concerns
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy: A Machine Learning View
IEEE Transactions on Knowledge and Data Engineering
Security in sensor networks: watermarking techniques
Wireless sensor networks
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Optimal randomization for privacy preserving data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Information integration: A research agenda
IBM Systems Journal
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Hiding Sensitive Patterns in Association Rules Mining
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Soft blocking: flexible blocker tags on the cheap
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Proceedings of the 11th ACM conference on Computer and communications security
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
Privacy-Preserving Data Mining: Why, How, and When
IEEE Security and Privacy
Data Obfuscation: Anonymity and Desensitization of Usable Data Sets
IEEE Security and Privacy
Preserving Privacy by De-Identifying Face Images
IEEE Transactions on Knowledge and Data Engineering
A Framework for High-Accuracy Privacy-Preserving Mining
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Top-Down Specialization for Information and Privacy Preservation
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Computational complexity of itemset frequency satisfiability
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On the complexity of optimal K-anonymity
PODS '04 Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Practical privacy: the SuLQ framework
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving clustering with distributed EM mixture modeling
Knowledge and Information Systems
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Mining interesting knowledge from weblogs: a survey
Data & Knowledge Engineering
Protecting medical data for decision-making analyses
Journal of Medical Systems - Special issue: Computer-based medical systems
Cardinality-based inference control in data cubes
Journal of Computer Security
SVD-based collaborative filtering with privacy
Proceedings of the 2005 ACM symposium on Applied computing
Privacy preserving learning in negotiation
Proceedings of the 2005 ACM symposium on Applied computing
A distributed learning framework for heterogeneous data sources
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
A new scheme on privacy-preserving data classification
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Checking for k-anonymity violation by views
VLDB '05 Proceedings of the 31st international conference on Very large data bases
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
A novel approach for privacy-preserving video sharing
Proceedings of the 14th ACM international conference on Information and knowledge management
Directions for security and privacy for semantic e-business applications
Communications of the ACM - The semantic e-business vision
Applications of secure electronic voting to automated privacy-preserving troubleshooting
Proceedings of the 12th ACM conference on Computer and communications security
IEEE Transactions on Knowledge and Data Engineering
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
A research agenda for distributed software development
Proceedings of the 28th international conference on Software engineering
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Towards value disclosure analysis in modeling general databases
Proceedings of the 2006 ACM symposium on Applied computing
On the use of spectral filtering for privacy preserving data mining
Proceedings of the 2006 ACM symposium on Applied computing
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Injecting utility into anonymized datasets
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Efficient anonymity-preserving data collection
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
On privacy preservation against adversarial data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
(α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
A reconstruction-based algorithm for classification rules hiding
ADC '06 Proceedings of the 17th Australasian Database Conference - Volume 49
Secure two-party computational geometry
Journal of Computer Science and Technology
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy leakage in multi-relational databases: a semi-supervised learning perspective
The VLDB Journal — The International Journal on Very Large Data Bases
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
IEEE Transactions on Knowledge and Data Engineering
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Secure multiparty computation of approximations
ACM Transactions on Algorithms (TALG)
Privacy-preserving payload-based correlation for accurate malicious traffic detection
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Towards robustness in query auditing
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Tools for privacy preserving Kernel methods in data mining
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Privacy-preserving mining by rotational data transformation
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Hiding Sensitive Association Rules with Limited Side Effects
IEEE Transactions on Knowledge and Data Engineering
Report from the clean slate network research post-sigcomm 2006 workshop
ACM SIGCOMM Computer Communication Review
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Hiding informative association rule sets
Expert Systems with Applications: An International Journal
Association rules mining in vertically partitioned databases
Data & Knowledge Engineering - Special issue: WIDM 2004
Data Mining and Knowledge Discovery
Security and privacy for multimedia database management systems
Multimedia Tools and Applications
Privacy-preserving collaborative association rule mining
Journal of Network and Computer Applications
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Proceedings of the 16th international conference on World Wide Web
Privacy-enhancing personalized web search
Proceedings of the 16th international conference on World Wide Web
Privacy preserving itemset mining through fake transactions
Proceedings of the 2007 ACM symposium on Applied computing
Privacy-aware location sensor networks
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
IEEE Pervasive Computing
Data Management in the Worldwide Sensor Web
IEEE Pervasive Computing
Privacy and e-commerce: a consumer-centric perspective
Electronic Commerce Research
Privacy, accuracy, and consistency too: a holistic solution to contingency table release
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Hiding collaborative recommendation association rules
Applied Intelligence
Privacy protection in personalized search
ACM SIGIR Forum
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Large-scale collection and sanitization of network security data: risks and challenges
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Secure computation with horizontally partitioned data using adaptive regression splines
Computational Statistics & Data Analysis
Challenges in mining social network data: processes, privacy, and paradoxes
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Editorial: Some issues in privacy data management
Data & Knowledge Engineering
Privacy preserving clustering on horizontally partitioned data
Data & Knowledge Engineering
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
IEEE Transactions on Knowledge and Data Engineering
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Secure two-party k-means clustering
Proceedings of the 14th ACM conference on Computer and communications security
Privacy-preserving remote diagnostics
Proceedings of the 14th ACM conference on Computer and communications security
Privacy preserving data mining of sequential patterns for network traffic data
Information Sciences: an International Journal
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Security in outsourcing of association rule mining
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The boundary between privacy and utility in data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
An agent-based approach for privacy-preserving recommender systems
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
Oblivious neural network computing via homomorphic encryption
EURASIP Journal on Information Security
Better bug reporting with better privacy
Proceedings of the 13th international conference on Architectural support for programming languages and operating systems
Guest editorial: Recent advances in preserving privacy when mining data
Data & Knowledge Engineering
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
Privacy-preserving imputation of missing data
Data & Knowledge Engineering
Itemset frequency satisfiability: Complexity and axiomatization
Theoretical Computer Science
Computational analysis of a nonstationary fatigue data using the ARIMA approaches
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Privacy preserving data obfuscation for inherently clustered data
International Journal of Information and Computer Security
A fuzzy programming approach for data reduction and privacy in distance-based mining
International Journal of Information and Computer Security
A novel data distortion approach via selective SSVD for privacy protection
International Journal of Information and Computer Security
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
Privacy Preserving Database Generation for Database Application Testing
Fundamenta Informaticae - Special issue ISMIS'05
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
SenseWorld: Towards Cyber-Physical Social Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Distributed privacy preserving k-means clustering with additive secret sharing
PAIS '08 Proceedings of the 2008 international workshop on Privacy and anonymity in information society
Efficient sanitization of informative association rules
Expert Systems with Applications: An International Journal
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Efficient temporal counting with bounded error
The VLDB Journal — The International Journal on Very Large Data Bases
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Discrimination-aware data mining
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving cox regression for survival analysis
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Learning about the world through long-term query logs
ACM Transactions on the Web (TWEB)
On disclosure risk analysis of anonymized itemsets in the presence of prior knowledge
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Ordered Data Set Vectorization for Linear Regression on Data Privacy
MDAI '07 Proceedings of the 4th international conference on Modeling Decisions for Artificial Intelligence
Privacy Preserving DBSCAN Algorithm for Clustering
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
A k-Anonymity Clustering Method for Effective Data Privacy Preservation
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Disclosure Risks of Distance Preserving Data Transformations
SSDBM '08 Proceedings of the 20th international conference on Scientific and Statistical Database Management
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Simulatable Binding: Beyond Simulatable Auditing
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
An Anonymity Model Achievable Via Microaggregation
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Dimension Reduction for Mixtures of Exponential Families
ICANN '08 Proceedings of the 18th international conference on Artificial Neural Networks, Part I
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Output perturbation with query relaxation
Proceedings of the VLDB Endowment
Dual encryption for query integrity assurance
Proceedings of the 17th ACM conference on Information and knowledge management
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Sharemind: A Framework for Fast Privacy-Preserving Computations
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Archive storage system design for long-term storage of massive amounts of data
IBM Journal of Research and Development
A maximum entropy approach to feature selection in knowledge-based authentication
Decision Support Systems
Maintenance of sanitizing informative association rules
Expert Systems with Applications: An International Journal
Statistical analysis of a nonstationary fatigue data using the ARIMA approach
WSEAS Transactions on Mathematics
Knowledge and Information Systems
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Secure Multi-party Protocols for Privacy Preserving Data Mining
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Hiding a Needle in a Haystack Using Negative Databases
Information Hiding
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Applying Privacy Preserving Count Aggregate Queries to k-Classification
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Identifying appropriate methodologies and strategies for vertical mining with incomplete data
WSEAS Transactions on Computers
Privacy preserving itemset mining through noisy items
Expert Systems with Applications: An International Journal
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Towards the evaluation of time series protection methods
Information Sciences: an International Journal
Distributed and Parallel Databases
Genetic algorithm-based clustering approach for k-anonymization
Expert Systems with Applications: An International Journal
Privacy preserving churn prediction
Proceedings of the 2009 ACM symposium on Applied Computing
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
Efficient Privacy-Preserving Link Discovery
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Partially materialized digest scheme: an efficient verification method for outsourced databases
The VLDB Journal — The International Journal on Very Large Data Bases
Proceedings of the 7th international conference on Mobile systems, applications, and services
Anonymizing healthcare data: a case study on the blood transfusion service
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Information Sciences: an International Journal
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Data Mining for Security Applications and Its Privacy Implications
Privacy, Security, and Trust in KDD
Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods
Privacy, Security, and Trust in KDD
Vertical mining with incomplete data
MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
Masking Gateway for Enterprises
Languages: From Formal to Natural
Genetic algorithm in time series fatigue analysis
MATH'08 Proceedings of the 13th WSEAS international conference on Applied mathematics
Privacy-Preserving Distributed Learning Based on Genetic Algorithms and Artificial Neural Networks
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living
Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Classification spanning private databases
AAAI'06 Proceedings of the 21st national conference on Artificial intelligence - Volume 1
Impossibility of unconditionally secure scalar products
Data & Knowledge Engineering
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
(α, k)-anonymous data publishing
Journal of Intelligent Information Systems
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Temporal privacy in wireless sensor networks: Theory and practice
ACM Transactions on Sensor Networks (TOSN)
Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Arguing from Experience to Classifying Noisy Data
DaWaK '09 Proceedings of the 11th International Conference on Data Warehousing and Knowledge Discovery
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Editorial: Recent progress in database privacy
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Proceedings of the 16th ACM conference on Computer and communications security
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Movement data anonymity through generalization
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
On the use of wavelet transform for privacy preserving data mining
CI '07 Proceedings of the Third IASTED International Conference on Computational Intelligence
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
The Functionality-Security-Privacy Game
MDAI '09 Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence
Hiding co-occurring frequent itemsets
Proceedings of the 2009 EDBT/ICDT Workshops
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
Inference in distributed data clustering
Engineering Applications of Artificial Intelligence
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Hiding collaborative recommendation association rules on horizontally partitioned data
Intelligent Data Analysis
Secure two and multi-party association rule mining
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
An approach of private classification on vertically partitioned data
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters
Transactions on Data Privacy
Communication-Efficient Privacy-Preserving Clustering
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
A cryptography based privacy preserving solution to mine cloud data
Proceedings of the Third Annual ACM Bangalore Conference
Data mining for discrimination discovery
ACM Transactions on Knowledge Discovery from Data (TKDD)
Restoring compromised privacy in micro-data disclosure
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Deriving private information from arbitrarily projected data
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
A hybrid multi-group privacy-preserving approach for building decision trees
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
(α, k)-anonymity based privacy preservation by lossy join
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
k-anonymization without Q-S associations
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
Privacy-preserving discovery of frequent patterns in time series
ICDM'07 Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications
Composite signal representation for fast and storage-efficient processing of encrypted signals
IEEE Transactions on Information Forensics and Security
Peer-to-peer data mining, privacy issues, and games
AIS-ADM'07 Proceedings of the 2nd international conference on Autonomous intelligent systems: agents and data mining
A data perturbation approach to sensitive classification rule hiding
Proceedings of the 2010 ACM Symposium on Applied Computing
Privacy preserving linear discriminant analysis from perturbed data
Proceedings of the 2010 ACM Symposium on Applied Computing
A secure multiparty computation privacy preserving OLAP framework over distributed XML data
Proceedings of the 2010 ACM Symposium on Applied Computing
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
K-anonymization with minimal loss of information
ESA'07 Proceedings of the 15th annual European conference on Algorithms
Privacy-preserving eigentaste-based collaborative filtering
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Answering queries based on imprecision and uncertainty trade-offs in numeric databases
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Efficient privacy preserving distributed clustering based on secret sharing
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Privacy preserving data mining of sequential patterns for network traffic data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Privacy preserving clustering for multi-party
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
On addressing accuracy concerns in privacy preserving association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy-preserving linear fisher discriminant analysis
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Protecting privacy in incremental maintenance for distributed association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Discovering private trajectories using background information
Data & Knowledge Engineering
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Privacy sensitive distributed data mining from multi-party data
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
An ad omnia approach to defining and achieving private data analysis
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
A cost-efficient and versatile sanitizing algorithm by using a greedy approach
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 2
Privacy-preserving data mining: A feature set partitioning approach
Information Sciences: an International Journal
Proceedings of the forty-second ACM symposium on Theory of computing
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
User profiling with privacy: a framework for adaptive information agents
Intelligent information agents
Programming with differential privacy: technical perspective
Communications of the ACM
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Movement Data Anonymity through Generalization
Transactions on Data Privacy
Efficient Anonymizations with Enhanced Utility
Transactions on Data Privacy
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
IEEE Transactions on Information Technology in Biomedicine
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
APPT: A privacy preserving transformation tool for micro data release
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Privacy vulnerability of published anonymous mobility traces
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Using NLG and sensors to support personal narrative for children with complex communication needs
SLPAT '10 Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies
Preserving privacy in semantic-rich trajectories of human mobility
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A privacy protection technique for publishing data mining models and research data
ACM Transactions on Management Information Systems (TMIS)
Resolving the complexity of some data privacy problems
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming: Part II
Theory of privacy and anonymity
Algorithms and theory of computation handbook
First CPIR protocol with data-dependent computation
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
IDEAL'10 Proceedings of the 11th international conference on Intelligent data engineering and automated learning
Publishing time-series data under preservation of privacy and distance orders
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part II
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
A data-centric approach to insider attack detection in database systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A review on time series data mining
Engineering Applications of Artificial Intelligence
Small domain randomization: same privacy, more utility
Proceedings of the VLDB Endowment
ACM Transactions on Database Systems (TODS)
Mixture of gaussian models and bayes error under differential privacy
Proceedings of the first ACM conference on Data and application security and privacy
RASP: efficient multidimensional range query on attack-resilient encrypted databases
Proceedings of the first ACM conference on Data and application security and privacy
Discord region based analysis to improve data utility of privately published time series
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy preserving spatio-temporal clustering on horizontally partitioned data
Ubiquitous knowledge discovery
REBIVE: a reliable private data aggregation scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Applied Computing
Target-based privacy preserving association rule mining
Proceedings of the 2011 ACM Symposium on Applied Computing
Privacy-aware collection of aggregate spatial data
Data & Knowledge Engineering
Privacy and security in ubiquitous knowledge discovery
Ubiquitous knowledge discovery
Privacy preserving spatio-temporal clustering on horizontally partitioned data
Ubiquitous knowledge discovery
HCMS: conceptual description of a health content management system
Proceedings of the 3rd Workshop on Software Engineering in Health Care
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
C-safety: a framework for the anonymization of semantic trajectories
Transactions on Data Privacy
Differentially Private Empirical Risk Minimization
The Journal of Machine Learning Research
Proceedings of the 2011 workshop on Data mining for medicine and healthcare
Journal of Computer and System Sciences
An index structure for private data outsourcing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Preserving privacy in wireless sensor networks using reliable data aggregation
ACM SIGAPP Applied Computing Review
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Non-metric multidimensional scaling for privacy-preserving data clustering
IDEAL'11 Proceedings of the 12th international conference on Intelligent data engineering and automated learning
To release or not to release: evaluating information leaks in aggregate human-genome data
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
An improved EDP algorithm to privacy protection in data mining
BI'11 Proceedings of the 2011 international conference on Brain informatics
Communications of the ACM
Automatically optimizing secure computation
Proceedings of the 18th ACM conference on Computer and communications security
A publication process model to enable privacy-aware data sharing
IBM Journal of Research and Development
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
Utility-driven anonymization in data publishing
Proceedings of the 20th ACM international conference on Information and knowledge management
No Free Lunch: Price Premium for Privacy Seal-Bearing Vendors
Journal of Management Information Systems
Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Differential privacy for location pattern mining
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
On the effectiveness of distributed learning on different class-probability distributions of data
CAEPIA'11 Proceedings of the 14th international conference on Advances in artificial intelligence: spanish association for artificial intelligence
SIAM Journal on Computing
Protecting data privacy through hard-to-reverse negative databases
ISC'06 Proceedings of the 9th international conference on Information Security
Theoretical bounds on the size of condensed representations
KDID'04 Proceedings of the Third international conference on Knowledge Discovery in Inductive Databases
CLINCH: clustering incomplete high-dimensional data for data mining application
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
k-Anonymous Decision Tree Induction
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
A privacy preserving mining algorithm on distributed dataset
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Privacy leakage in multi-relational learning via unwanted classification models
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research
Privacy-preserving decision tree mining based on random substitutions
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
On robust and effective k-anonymity in large databases
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Hierarchical infrastructure for large-scale distributed privacy-preserving data mining
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Empirical analysis of database privacy using twofold integrals
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
An improved EMASK algorithm for privacy-preserving frequent pattern mining
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Can attackers learn from samples?
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
KD3 scheme for privacy preserving data mining
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium
Incorporating privacy concerns in data mining on distributed data
AIMSA'06 Proceedings of the 12th international conference on Artificial Intelligence: methodology, Systems, and Applications
Web personalization: my own web based on open content platform
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
SP'04 Proceedings of the 12th international conference on Security Protocols
Achieving k-anonymity by clustering in attribute hierarchical structures
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
Privacy preserving spatio-temporal clustering on horizontally partitioned data
DaWaK'06 Proceedings of the 8th international conference on Data Warehousing and Knowledge Discovery
SA-IFIM: incrementally mining frequent itemsets in update distorted databases
ADMA'06 Proceedings of the Second international conference on Advanced Data Mining and Applications
Privacy-preserving reconstruction of multidimensional data maps in vehicular participatory sensing
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Privacy-preserving location publishing under road-network constraints
DASFAA'10 Proceedings of the 15th international conference on Database Systems for Advanced Applications - Volume Part II
Privacy preserving unsupervised clustering over vertically partitioned data
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Information driven evaluation of data hiding algorithms
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Hiding classification rules for data sharing with privacy preservation
DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
Privacy preserving data mining services on the web
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
ICDT'05 Proceedings of the 10th international conference on Database Theory
An effective approach for hiding sensitive knowledge in data publishing
WAIM '06 Proceedings of the 7th international conference on Advances in Web-Age Information Management
Inference on distributed data clustering
MLDM'05 Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving collaborative association rule mining
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-preserving distributed k-anonymity
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Performance measurements for privacy preserving data mining
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
A privacy-preserving classification mining algorithm
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Limiting disclosure of sensitive data in sequential releases of databases
Information Sciences: an International Journal
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Private mining of association rules
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Data distortion for privacy protection in a terrorist analysis system
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Privacy in data mining using formal methods
TLCA'05 Proceedings of the 7th international conference on Typed Lambda Calculi and Applications
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Information theory and the security of binary data perturbation
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Emergency Access Authorization for Personally Controlled Online Health Care Data
Journal of Medical Systems
Privacy aware publishing of successive location information in sensor networks
Future Generation Computer Systems
Journal of Network and Computer Applications
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Difference set attacks on conjunctive keyword search schemes
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Privacy preserving BIRCH algorithm for clustering over vertically partitioned databases
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Our data, ourselves: privacy via distributed noise generation
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Distance based re-identification for time series, analysis of distances
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Privacy-Preserving data set union
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Efficient mining of frequent itemsets in distorted databases
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Recent research on privacy preserving data mining
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Collusion-Resistant protocol for privacy-preserving distributed association rules mining
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Oblivious conjunctive keyword search
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Calibrating noise to sensitivity in private data analysis
TCC'06 Proceedings of the Third conference on Theory of Cryptography
New approach to the re-identification problem using neural networks
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
Providing group anonymity using wavelet transform
BNCOD'10 Proceedings of the 27th British national conference on Data Security and Security Data
Permutation anonymization: improving anatomy for privacy preservation in data publication
PAKDD'11 Proceedings of the 15th international conference on New Frontiers in Applied Data Mining
Secure distributed computation of anonymized views of shared databases
ACM Transactions on Database Systems (TODS)
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
Web intelligence and communities
Proceedings of the 4th International Workshop on Web Intelligence & Communities
More than modelling and hiding: towards a comprehensive view of Web mining and privacy
Data Mining and Knowledge Discovery
A practical approximation algorithm for optimal k-anonymity
Data Mining and Knowledge Discovery
k-Concealment: An Alternative Model of k-Type Anonymity
Transactions on Data Privacy
A Practical Differentially Private Random Decision Tree Classifier
Transactions on Data Privacy
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases
PODS '12 Proceedings of the 31st symposium on Principles of Database Systems
Aggregate suppression for enterprise search engines
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
PISA: A framework for multiagent classification using argumentation
Data & Knowledge Engineering
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
FoIKS'12 Proceedings of the 7th international conference on Foundations of Information and Knowledge Systems
A historical probability based noise generation strategy for privacy protection in cloud computing
Journal of Computer and System Sciences
Desiderata for research in web intelligence, mining and semantics
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
A trust-based noise injection strategy for privacy protection in cloud
Software—Practice & Experience
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
Survey: DNA-inspired information concealing: A survey
Computer Science Review
A Time-Series Pattern Based Noise Generation Strategy for Privacy Protection in Cloud Computing
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
An evolutionary optimization approach for categorical data protection
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy preserving distributed DBSCAN clustering
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy-preserving ranking over vertically partitioned data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
A novel framework for preserving privacy of data using correlation analysis
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A classification based framework for privacy preserving data mining
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Privacy-preserving back-propagation and extreme learning machine algorithms
Data & Knowledge Engineering
Proceedings of the Sixth International Workshop on Data Mining for Online Advertising and Internet Economy
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Privacy-preserving subgraph discovery
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Privacy-preserving content-based recommender system
Proceedings of the on Multimedia and security
On Distributed k-Anonymization
Fundamenta Informaticae
Privacy Preserving Database Generation for Database Application Testing
Fundamenta Informaticae - Special issue ISMIS'05
Extracting incidental and global knowledge through compact pattern trees in distributed environment
RSKT'12 Proceedings of the 7th international conference on Rough Sets and Knowledge Technology
A clustering approach for structural k-anonymity in social networks using genetic algorithm
Proceedings of the CUBE International Information Technology Conference
Fuzzy based privacy preserving classification of data streams
Proceedings of the CUBE International Information Technology Conference
Online Randomization Strategies to Obfuscate User Behavioral Patterns
Journal of Network and Systems Management
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Participatory personal data: An emerging research challenge for the information sciences
Journal of the American Society for Information Science and Technology
Privacy-preserving genetic algorithms for rule discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
An enhanced secure preserving for pre-processed data using DMI and PCRBAC algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Retention replacement in privacy preserving classification
ADBIS'12 Proceedings of the 16th East European conference on Advances in Databases and Information Systems
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
Theoretical Results on De-Anonymization via Linkage Attacks
Transactions on Data Privacy
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Specialization in i* strategic rationale diagrams
ER'12 Proceedings of the 31st international conference on Conceptual Modeling
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Low Dimensional Data Privacy Preservation Using Multi Layer Artificial Neural Network
International Journal of Intelligent Information Technologies
International Journal of Data Warehousing and Mining
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Privacy-preserving disjunctive normal form operations on distributed sets
Information Sciences: an International Journal
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Secure Bayesian model averaging for horizontally partitioned data
Statistics and Computing
Class-Restricted Clustering and Microperturbation for Data Privacy
Management Science
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Verifiable and private top-k monitoring
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Integer partitioning based encryption for privacy preservation in data mining
Proceedings of the First International Conference on Security of Internet of Things
UV-diagram: a voronoi diagram for uncertain spatial databases
The VLDB Journal — The International Journal on Very Large Data Bases
Using TF-IDF to hide sensitive itemsets
Applied Intelligence
Differential data analysis for recommender systems
Proceedings of the 7th ACM conference on Recommender systems
Privacy-preserving billing for e-ticketing systems in public transportation
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Trends and research directions for privacy preserving approaches on the cloud
Proceedings of the 6th ACM India Computing Convention
Coopetitive data warehouse: a case study
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Towards privacy-preserving fault detection
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems
Privacy vulnerability of published anonymous mobility traces
IEEE/ACM Transactions on Networking (TON)
Incorporating Privacy into the Undergraduate Curriculum
Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference
Efficient Time-Stamped Event Sequence Anonymization
ACM Transactions on the Web (TWEB)
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs
ACM Transactions on Knowledge Discovery from Data (TKDD)
A survey of multiple classifier systems as hybrid systems
Information Fusion
Improving accuracy of classification models induced from anonymized datasets
Information Sciences: an International Journal
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
An event-based platform for collaborative threats detection and monitoring
Information Systems
The Journal of Supercomputing
A near-optimal algorithm for differentially-private principal components
The Journal of Machine Learning Research
Dividing secrets to secure data outsourcing
Information Sciences: an International Journal
Distributed and Parallel Databases
Research topics on web intelligence and communities
Web Intelligence and Agent Systems - Web Intelligence and Communities
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.07 |
A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Specifically, we address the following question. Since the primary task in data mining is the development of models about aggregated data, can we develop accurate models without access to precise information in individual data records? We consider the concrete case of building a decision-tree classifier from training data in which the values of individual records have been perturbed. The resulting data records look very different from the original records and the distribution of data values is also very different from the original distribution. While it is not possible to accurately estimate original values in individual data records, we propose a novel reconstruction procedure to accurately estimate the distribution of original data values. By using these reconstructed distributions, we are able to build classifiers whose accuracy is comparable to the accuracy of classifiers built with the original data.