Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Data mining: concepts and techniques
Data mining: concepts and techniques
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Building decision tree classifier on private data
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Mining association rules with non-uniform privacy concerns
Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery
CITRIS and data and knowledge engineering: what is old and what is new?
Data & Knowledge Engineering - Special jubilee issue: DKE 50
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Anonymity-preserving data collection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
A new scheme on privacy-preserving data classification
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Efficient anonymity-preserving data collection
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Tools for privacy preserving Kernel methods in data mining
AIA'06 Proceedings of the 24th IASTED international conference on Artificial intelligence and applications
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
Privacy-preserving multi-party decision tree induction
International Journal of Business Intelligence and Data Mining
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
Privacy Preserving Data Mining Research: Current Status and Key Issues
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Information Sciences: an International Journal
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
A novel anonymization algorithm: Privacy protection and knowledge preservation
Expert Systems with Applications: An International Journal
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
A hybrid multi-group privacy-preserving approach for building decision trees
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Using cryptography for privacy protection in data mining systems
WImBI'06 Proceedings of the 1st WICI international conference on Web intelligence meets brain informatics
A three-dimensional conceptual framework for database privacy
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Privacy preserving clustering for multi-party
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
ICNC'09 Proceedings of the 5th international conference on Natural computation
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Small domain randomization: same privacy, more utility
Proceedings of the VLDB Endowment
Achieving private recommendations using randomized response techniques
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
An improved EMASK algorithm for privacy-preserving frequent pattern mining
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
Suppressing microdata to prevent probabilistic classification based inference
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
KD3 scheme for privacy preserving data mining
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
Performance measurements for privacy preserving data mining
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
A privacy-preserving classification mining algorithm
PAKDD'05 Proceedings of the 9th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Performance-oriented privacy-preserving data integration
DILS'05 Proceedings of the Second international conference on Data Integration in the Life Sciences
Emergency Access Authorization for Personally Controlled Online Health Care Data
Journal of Medical Systems
Efficient mining of frequent itemsets in distorted databases
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
Privacy-preserving frequent itemsets mining via secure collaborative framework
Security and Communication Networks
Privacy preserving distributed DBSCAN clustering
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Distributed and Parallel Databases
Hi-index | 0.00 |
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. Specially, we present a method to build decision tree classifiers from the disguised data. We conduct experiments to compare the accuracy of our decision tree with the one built from the original undisguised data. Our results show that although the data are disguised, our method can still achieve fairly high accuracy. We also show how the parameter used in the randomized response techniques affects the accuracy of the results.