Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
The statistical security of a statistical database
ACM Transactions on Database Systems (TODS)
Dependency Detection in MobiMine and Random Matrices
PKDD '02 Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
DaWaK '99 Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Analysis of privacy preserving random perturbation techniques: further explorations
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Optimal randomization for privacy preserving data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
A Framework for High-Accuracy Privacy-Preserving Mining
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Privacy-enhancing k-anonymization of customer data
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
A privacy-sensitive approach to distributed clustering
Pattern Recognition Letters - Special issue: Advances in pattern recognition
A distributed learning framework for heterogeneous data sources
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
A new scheme on privacy-preserving data classification
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
IEEE Transactions on Knowledge and Data Engineering
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Proceedings of the 2006 ACM symposium on Applied computing
Towards value disclosure analysis in modeling general databases
Proceedings of the 2006 ACM symposium on Applied computing
On the use of spectral filtering for privacy preserving data mining
Proceedings of the 2006 ACM symposium on Applied computing
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy leakage in multi-relational databases: a semi-supervised learning perspective
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
On static and dynamic methods for condensation-based privacy-preserving data mining
ACM Transactions on Database Systems (TODS)
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
Ownership protection of shape datasets with geodesic distance preservation
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Knowledge and Information Systems
IDEAL '08 Proceedings of the 9th International Conference on Intelligent Data Engineering and Automated Learning
FRAPP: a framework for high-accuracy privacy-preserving mining
Data Mining and Knowledge Discovery
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy preserving churn prediction
Proceedings of the 2009 ACM symposium on Applied Computing
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
A tree-based approach to preserve the privacy of software engineering data and predictive models
PROMISE '09 Proceedings of the 5th International Conference on Predictor Models in Software Engineering
Embedding and Retrieving Private Metadata in Electrocardiograms
Journal of Medical Systems
Information Sciences: an International Journal
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
On Distributed k-Anonymization
Fundamenta Informaticae
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
A cubic-wise balance approach for privacy preservation in data cubes
Information Sciences: an International Journal
Inaccuracy as a privacy-enhancing tool
Ethics and Information Technology
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Deriving private information from arbitrarily projected data
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy preserving linear discriminant analysis from perturbed data
Proceedings of the 2010 ACM Symposium on Applied Computing
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
On addressing accuracy concerns in privacy preserving association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Discovering private trajectories using background information
Data & Knowledge Engineering
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Preserving privacy in participatory sensing systems
Computer Communications
Enabling search services on outsourced private spatial data
The VLDB Journal — The International Journal on Very Large Data Bases
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Reliable medical recommendation systems with patient privacy
Proceedings of the 1st ACM International Health Informatics Symposium
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
COP: a step toward children online privacy
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
ACM Transactions on Database Systems (TODS)
Mixture of gaussian models and bayes error under differential privacy
Proceedings of the first ACM conference on Data and application security and privacy
REBIVE: a reliable private data aggregation scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Applied Computing
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Preserving privacy in wireless sensor networks using reliable data aggregation
ACM SIGAPP Applied Computing Review
Non-metric multidimensional scaling for privacy-preserving data clustering
IDEAL'11 Proceedings of the 12th international conference on Intelligent data engineering and automated learning
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
An agent based privacy preserving mining for distributed databases
CIS'04 Proceedings of the First international conference on Computational and Information Science
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Privacy-preserving decision tree mining based on random substitutions
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Privacy-Preserving decision trees over vertically partitioned data
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Toward privacy in public databases
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Performance evaluation of an agent based distributed data mining system
AI'05 Proceedings of the 18th Canadian Society conference on Advances in Artificial Intelligence
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Recent research on privacy preserving data mining
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
On Distributed k-Anonymization
Fundamenta Informaticae
Right-protected data publishing with hierarchical clustering preservation
Proceedings of the 21st ACM international conference on Information and knowledge management
Retention replacement in privacy preserving classification
ADBIS'12 Proceedings of the 16th East European conference on Advances in Databases and Information Systems
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Multi-agent based middleware for protecting privacy in IPTV content recommender services
Multimedia Tools and Applications
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
A taxonomy of privacy-preserving record linkage techniques
Information Systems
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
A scalable privacy-preserving recommendation scheme via bisecting k-means clustering
Information Processing and Management: an International Journal
Reliable medical recommendation systems with patient privacy
ACM Transactions on Intelligent Systems and Technology (TIST) - Survey papers, special sections on the semantic adaptive social web, intelligent systems for health informatics, regular papers
An iterative two-party protocol for scalable privacy-preserving record linkage
AusDM '12 Proceedings of the Tenth Australasian Data Mining Conference - Volume 134
Distributed and Parallel Databases
Hi-index | 0.00 |
Privacy is becoming an increasingly important issue inmany data mining applications. This has triggered the developmentof many privacy-preserving data mining techniques.A large fraction of them use randomized data distortiontechniques to mask the data for preserving the privacyof sensitive data. This methodology attempts to hidethe sensitive data by randomly modifying the data values oftenusing additive noise. This paper questions the utility ofthe random value distortion technique in privacy preservation.The paper notes that random objects (particularly randommatrices) have "predictable" structures in the spectraldomain and it develops a random matrix-based spectral filteringtechnique to retrieve original data from the datasetdistorted by adding random values. The paper presents thetheoretical foundation of this filtering method and extensiveexperimental results to demonstrate that in many cases randomdata distortion preserve very little data privacy. Thepaper also points out possible avenues for the developmentof new privacy-preserving data mining techniques like exploitingmultiplicative and colored noise for preserving privacyin data mining applications.