Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Fast discovery of association rules
Advances in knowledge discovery and data mining
Efficiently mining long patterns from databases
SIGMOD '98 Proceedings of the 1998 ACM SIGMOD international conference on Management of data
Communications of the ACM
Data mining (Invited talk. Abstract only): crossing the Chasm
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Machine Learning
Machine Learning
Statistical Databases: Characteristics, Problems, and some Solutions
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Selective partial access to a database
ACM '76 Proceedings of the 1976 annual conference
Data Mining Technologies for Digital Libraries and Web Information Systems
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
Cardinality-Based Inference Control in Sum-Only Data Cubes
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Data mining, national security, privacy and civil liberties
ACM SIGKDD Explorations Newsletter
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
An XPath-based preference language for P3P
WWW '03 Proceedings of the 12th international conference on World Wide Web
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy conflicts in CRM services for online shops: a case study
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
An architecture for privacy-preserving mining of client information
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving Distributed Clustering using Generative Models
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Detecting privacy and ethical sensitivity in data mining results
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Analysis of privacy preserving random perturbation techniques: further explorations
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy preserving database application testing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Mining association rules with non-uniform privacy concerns
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy: A Machine Learning View
IEEE Transactions on Knowledge and Data Engineering
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Optimal randomization for privacy preserving data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Hiding Sensitive Patterns in Association Rules Mining
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Assessing global disclosure risk in masked microdata
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
A Framework for High-Accuracy Privacy-Preserving Mining
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Mining interesting knowledge from weblogs: a survey
Data & Knowledge Engineering
Cardinality-based inference control in data cubes
Journal of Computer Security
Privacy preserving learning in negotiation
Proceedings of the 2005 ACM symposium on Applied computing
Blocking-aware private record linkage
Proceedings of the 2nd international workshop on Information quality in information systems
A distributed learning framework for heterogeneous data sources
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Distributed higher order association rule mining using information extracted from textual data
ACM SIGKDD Explorations Newsletter - Natural language processing and text mining
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
IEEE Transactions on Knowledge and Data Engineering
Template-Based Privacy Preservation in Classification Problems
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
On privacy preservation against adversarial data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Multi-scaling sampling: an adaptive sampling method for discovering approximate association rules
Journal of Computer Science and Technology
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy leakage in multi-relational databases: a semi-supervised learning perspective
The VLDB Journal — The International Journal on Very Large Data Bases
A Tree-Based Data Perturbation Approach for Privacy-Preserving Data Mining
IEEE Transactions on Knowledge and Data Engineering
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Hiding informative association rule sets
Expert Systems with Applications: An International Journal
Association rules mining in vertically partitioned databases
Data & Knowledge Engineering - Special issue: WIDM 2004
Security and privacy for multimedia database management systems
Multimedia Tools and Applications
Handicapping attacker's confidence: an alternative to k-anonymization
Knowledge and Information Systems
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Privacy preserving itemset mining through fake transactions
Proceedings of the 2007 ACM symposium on Applied computing
Privacy Protection in Data Mining: A Perturbation Approach for Categorical Data
Information Systems Research
Hiding collaborative recommendation association rules
Applied Intelligence
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining
Advanced Engineering Informatics
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Efficient algorithms for distortion and blocking techniques in association rule hiding
Distributed and Parallel Databases
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Privacy preserving data mining of sequential patterns for network traffic data
Information Sciences: an International Journal
A privacy-preserving index for range queries
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Security in outsourcing of association rule mining
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Minimality attack in privacy preserving data publishing
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
A framework for condensation-based anonymization of string data
Data Mining and Knowledge Discovery
Privacy-MaxEnt: integrating background knowledge in privacy quantification
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Efficient sanitization of informative association rules
Expert Systems with Applications: An International Journal
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Workload-aware anonymization techniques for large-scale datasets
ACM Transactions on Database Systems (TODS)
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Anonymizing transaction databases for publication
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Optimization for MASK Scheme in Privacy Preserving Data Mining for Association Rules
RSEISP '07 Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
Sharemind: A Framework for Fast Privacy-Preserving Computations
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Maintenance of sanitizing informative association rules
Expert Systems with Applications: An International Journal
Knowledge and Information Systems
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Privacy preserving itemset mining through noisy items
Expert Systems with Applications: An International Journal
A Bayesian Approach for Estimating and Replacing Missing Categorical Data
Journal of Data and Information Quality (JDIQ)
Evaluating privacy threats in released database views by symmetric indistinguishability
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Privately detecting bursts in streaming, distributed time series data
Data & Knowledge Engineering
Efficient and Anonymous Online Data Collection
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Anonymization-based attacks in privacy-preserving data publishing
ACM Transactions on Database Systems (TODS)
Collusion-resistant anonymous data collection method
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Information Sciences: an International Journal
Secure kNN computation on encrypted databases
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
On Distributed k-Anonymization
Fundamenta Informaticae
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
XPref: a preference language for P3P
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Security standards for the semantic web
Computer Standards & Interfaces
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Decision Support Systems
Employing PRBAC for privacy preserving data publishing
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Information theory for data management
Proceedings of the VLDB Endowment
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Anonymization of set-valued data via top-down, local generalization
Proceedings of the VLDB Endowment
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Hiding collaborative recommendation association rules on horizontally partitioned data
Intelligent Data Analysis
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Expert Systems with Applications: An International Journal
A hybrid multi-group privacy-preserving approach for building decision trees
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Privacy-preserving discovery of frequent patterns in time series
ICDM'07 Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
Answering queries based on imprecision and uncertainty trade-offs in numeric databases
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Privacy preserving data mining of sequential patterns for network traffic data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
On addressing accuracy concerns in privacy preserving association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Large-scale k-means clustering with user-centric privacy preservation
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Proceedings of the forty-second ACM symposium on Theory of computing
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Information theory for data management
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Freedom of Privacy: Anonymous Data Collection with Respondent-Defined Privacy Protection
INFORMS Journal on Computing
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Small, stupid, and scalable: secure computing with faerieplay
Proceedings of the fifth ACM workshop on Scalable trusted computing
Understanding privacy risk of publishing decision trees
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
ρ-uncertainty: inference-proof transaction anonymization
Proceedings of the VLDB Endowment
ACM Transactions on Database Systems (TODS)
Social Network Analysis and Mining for Business Applications
ACM Transactions on Intelligent Systems and Technology (TIST)
Target-based privacy preserving association rule mining
Proceedings of the 2011 ACM Symposium on Applied Computing
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Optimized two party privacy preserving association rule mining using fully homomorphic encryption
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Theoretical bounds on the size of condensed representations
KDID'04 Proceedings of the Third international conference on Knowledge Discovery in Inductive Databases
Privacy-preserving decision tree mining based on random substitutions
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
An improved EMASK algorithm for privacy-preserving frequent pattern mining
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Mining association rules from distorted data for privacy preservation
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Privacy in data mining using formal methods
TLCA'05 Proceedings of the 7th international conference on Typed Lambda Calculi and Applications
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Indistinguishability: the other aspect of privacy
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Recent research on privacy preserving data mining
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Collusion-Resistant protocol for privacy-preserving distributed association rules mining
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Hiding emerging patterns with local recoding generalization
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
Towards statistical queries over distributed private user data
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
The loss of location privacy in the cellular age
Communications of the ACM
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
Anonymizing set-valued data by nonreciprocal recoding
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
A universal toolkit for cryptographically secure privacy-preserving data mining
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
On Distributed k-Anonymization
Fundamenta Informaticae
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Specialization in i* strategic rationale diagrams
ER'12 Proceedings of the 31st international conference on Conceptual Modeling
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
International Journal of Information Security and Privacy
Information preservation in statistical privacy and bayesian estimation of unattributed histograms
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Solving inverse frequent itemset mining with infrequency constraints via large-scale linear programs
ACM Transactions on Knowledge Discovery from Data (TKDD)
Dividing secrets to secure data outsourcing
Information Sciences: an International Journal
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.02 |
We present a framework for mining association rules from transactions consisting of categorical items where the data has been randomized to preserve privacy of individual transactions. While it is feasible to recover association rules and preserve privacy using a straightforward "uniform" randomization, the discovered rules can unfortunately be exploited to find privacy breaches. We analyze the nature of privacy breaches and propose a class of randomization operators that are much more effective than uniform randomization in limiting the breaches. We derive formulae for an unbiased support estimator and its variance, which allow us to recover itemset supports from randomized datasets, and show how to incorporate these formulae into mining algorithms. Finally, we present experimental results that validate the algorithm by applying it on real datasets.