STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
On the Accuracy of Meta-learning for Scalable Data Mining
Journal of Intelligent Information Systems
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Efficient Mining of Association Rules in Distributed Databases
IEEE Transactions on Knowledge and Data Engineering
Distributed Web Mining Using Bayesian Networks from Multiple Data Streams
ICDM '01 Proceedings of the 2001 IEEE International Conference on Data Mining
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
A Secure Protocol for Computing Dot-Products in Clustered and Distributed Environments
ICPP '02 Proceedings of the 2002 International Conference on Parallel Processing
An extensible meta-learning approach for scalable and accurate inductive learning
An extensible meta-learning approach for scalable and accurate inductive learning
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Preface: proceedings of the ICDM 2002 workshop on privacy, security, and data mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Building decision tree classifier on private data
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
An architecture for privacy-preserving mining of client information
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Assuring privacy when big brother is watching
DMKD '03 Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Privacy preserving mining of association rules
Information Systems - Knowledge discovery and data mining (KDD 2002)
Analysis of privacy preserving random perturbation techniques: further explorations
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Leveraging the "Multi" in secure multi-party computation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy preserving database application testing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Mining association rules with non-uniform privacy concerns
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
Privacy: A Machine Learning View
IEEE Transactions on Knowledge and Data Engineering
k-TTP: a new privacy model for large-scale distributed environments
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving regression modelling via distributed computation
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Optimal randomization for privacy preserving data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
Building predictors from vertically distributed data
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Random-data perturbation techniques and privacy-preserving data mining
Knowledge and Information Systems
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy-preserving clustering with distributed EM mixture modeling
Knowledge and Information Systems
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Cardinality-based inference control in data cubes
Journal of Computer Security
Privacy preserving learning in negotiation
Proceedings of the 2005 ACM symposium on Applied computing
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
On k-anonymity and the curse of dimensionality
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Distributed higher order association rule mining using information extracted from textual data
ACM SIGKDD Explorations Newsletter - Natural language processing and text mining
A new permutation approach for distributed association rule mining
Proceedings of the 14th ACM international conference on Information and knowledge management
IEEE Transactions on Knowledge and Data Engineering
Privacy-Preserving Frequent Pattern Mining across Private Databases
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
On privacy preservation against adversarial data mining
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Tools for privacy preserving Kernel methods in data mining
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Privacy preserving sequential pattern mining in distributed databases
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Hiding Sensitive Association Rules with Limited Side Effects
IEEE Transactions on Knowledge and Data Engineering
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Hiding informative association rule sets
Expert Systems with Applications: An International Journal
Association rules mining in vertically partitioned databases
Data & Knowledge Engineering - Special issue: WIDM 2004
Privacy-preserving collaborative association rule mining
Journal of Network and Computer Applications
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Privacy preserving itemset mining through fake transactions
Proceedings of the 2007 ACM symposium on Applied computing
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Hiding collaborative recommendation association rules
Applied Intelligence
The privacy of k-NN retrieval for horizontal partitioned data: new methods and applications
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Secure computation with horizontally partitioned data using adaptive regression splines
Computational Statistics & Data Analysis
Privacy-preservation for gradient descent methods
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Privacy preserving clustering on horizontally partitioned data
Data & Knowledge Engineering
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Privacy-preserving multi-party decision tree induction
International Journal of Business Intelligence and Data Mining
Privacy-preserving collision detection of two circles
Proceedings of the 2nd international conference on Scalable information systems
Parity-based inference control for multi-dimensional range sum queries
Journal of Computer Security
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Efficient sanitization of informative association rules
Expert Systems with Applications: An International Journal
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving classification of vertically partitioned data via random kernels
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
ACM SIGKDD Explorations Newsletter
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Optimization for MASK Scheme in Privacy Preserving Data Mining for Association Rules
RSEISP '07 Proceedings of the international conference on Rough Sets and Intelligent Systems Paradigms
Hiding Sensitive Associative Classification Rule by Data Reduction
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Providing Naïve Bayesian Classifier-Based Private Recommendations on Partitioned Data
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
Information Security and Cryptology
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
ADMA '08 Proceedings of the 4th international conference on Advanced Data Mining and Applications
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
Maintenance of sanitizing informative association rules
Expert Systems with Applications: An International Journal
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
Privacy-preserving data mining in the malicious model
International Journal of Information and Computer Security
Privacy preserving itemset mining through noisy items
Expert Systems with Applications: An International Journal
Privacy-preserving data mashup
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Mining globally interesting patterns from multiple databases using kernel estimation
Expert Systems with Applications: An International Journal
International Journal of Computer Applications in Technology
On Distributed k-Anonymization
Fundamenta Informaticae
Hiding Predictive Association Rules on Horizontally Distributed Data
IEA/AIE '09 Proceedings of the 22nd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: Next-Generation Applied Intelligence
Impossibility of unconditionally secure scalar products
Data & Knowledge Engineering
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Efficient and secure protocols for privacy-preserving set operations
ACM Transactions on Information and System Security (TISSEC)
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
A Secure Protocol to Maintain Data Privacy in Data Mining
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules
RuleML '09 Proceedings of the 2009 International Symposium on Rule Interchange and Applications
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Hiding collaborative recommendation association rules on horizontally partitioned data
Intelligent Data Analysis
Secure two and multi-party association rule mining
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
An approach of private classification on vertically partitioned data
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Proceedings of the 2010 EDBT/ICDT Workshops
HHUIF and MSICF: Novel algorithms for privacy preserving utility mining
Expert Systems with Applications: An International Journal
A hybrid multi-group privacy-preserving approach for building decision trees
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Visualizing trends in knowledge management
KSEM'07 Proceedings of the 2nd international conference on Knowledge science, engineering and management
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Privacy preserving clustering for multi-party
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Privacy-preserving linear fisher discriminant analysis
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Protecting privacy in incremental maintenance for distributed association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Efficient privacy-preserving similar document detection
The VLDB Journal — The International Journal on Very Large Data Bases
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
ACM Transactions on Database Systems (TODS)
Efficient privacy-preserving data mining in malicious model
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
Privacy-preserving data mining in presence of covert adversaries
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
A two-party protocol with trusted initializer for computing the inner product
WISA'10 Proceedings of the 11th international conference on Information security applications
Journal of Computer and System Sciences
Privacy-preserving data mining: a game-theoretic approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
An efficient cacheable secure scalar product protocol for privacy-preserving data mining
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
Privacy preserving feature selection for distributed data using virtual dimension
Proceedings of the 20th ACM international conference on Information and knowledge management
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
Information theoretical analysis of two-party secret computation
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Privacy leakage in multi-relational learning via unwanted classification models
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Efficient classification from multiple heterogeneous databases
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Privacy-preserving collaborative filtering on vertically partitioned data
PKDD'05 Proceedings of the 9th European conference on Principles and Practice of Knowledge Discovery in Databases
Privacy preserving decision tree in multi party environment
AIRS'05 Proceedings of the Second Asia conference on Asia Information Retrieval Technology
Privacy preserving DBSCAN for vertically partitioned data
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
More on shared-scalar-product protocols
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Privacy preserving unsupervised clustering over vertically partitioned data
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Secrecy of two-party secure computation
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy-Preserving collaborative association rule mining
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Mining association rules from distorted data for privacy preservation
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Rule synthesizing from multiple related databases
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
Private mining of association rules
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Privacy in data mining using formal methods
TLCA'05 Proceedings of the 7th international conference on Typed Lambda Calculi and Applications
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Secure anonymization for incremental datasets
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Privacy preserving BIRCH algorithm for clustering over vertically partitioned databases
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Oblivious scalar-product protocols
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
“Secure” log-linear and logistic regression analysis of distributed databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Recent research on privacy preserving data mining
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Collusion-Resistant protocol for privacy-preserving distributed association rules mining
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Privacy-Preserving network aggregation
PAKDD'10 Proceedings of the 14th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Secure Distributed Subgroup Discovery in Horizontally Partitioned Data
Transactions on Data Privacy
Privacy preserving electronic data gathering
Mathematical and Computer Modelling: An International Journal
Privacy-preserving ranking over vertically partitioned data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
A classification based framework for privacy preserving data mining
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
On Distributed k-Anonymization
Fundamenta Informaticae
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving genetic algorithms for rule discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
ICTAC'12 Proceedings of the 9th international conference on Theoretical Aspects of Computing
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Collusion-Free Privacy Preserving Data Mining
International Journal of Intelligent Information Technologies
Secure Two-Party Association Rule Mining Based on One-Pass FP-Tree
International Journal of Information Security and Privacy
Lightweight privacy-preserving peer-to-peer data integration
Proceedings of the VLDB Endowment
Efficient privacy-aware record integration
Proceedings of the 16th International Conference on Extending Database Technology
Secure Bayesian model averaging for horizontally partitioned data
Statistics and Computing
Verifying correctness of inner product of vectors in cloud computing
Proceedings of the 2013 international workshop on Security in cloud computing
Bloom filter bootstrap: privacy-preserving estimation of the size of an intersection
DBSec'13 Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
Journal of Medical Systems
Distributed and Parallel Databases
Hi-index | 0.01 |
Privacy considerations often constrain data mining projects. This paper addresses the problem of association rule mining where transactions are distributed across sources. Each site holds some attributes of each transaction, and the sites wish to collaborate to identify globally valid association rules. However, the sites must not reveal individual transaction data. We present a two-party algorithm for efficiently discovering frequent itemsets with minimum support levels, without either site revealing individual transaction values.