The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Principles of data mining
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Computational disclosure control: a primer on data privacy protection
Computational disclosure control: a primer on data privacy protection
Protecting Sensitive Knowledge By Data Sanitization
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Secure set intersection cardinality with application to association rule mining
Journal of Computer Security
Privacy-preserving distributed association rule mining via semi-trusted mixer
Data & Knowledge Engineering
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Privacy-preserving sequential pattern release
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Practical issues on privacy-preserving health data mining
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Information rich monitoring of interoperating services in privacy enabled B2B networks
International Journal of Advanced Media and Communication
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
“Secure” log-linear and logistic regression analysis of distributed databases
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Collusion-Free Privacy Preserving Data Mining
International Journal of Intelligent Information Technologies
Secure multiparty aggregation with differential privacy: a comparative study
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Evolutionary k-means for distributed data sets
Neurocomputing
Effective sanitization approaches to hide sensitive utility and frequent itemsets
Intelligent Data Analysis
Hi-index | 0.00 |
Data mining is under attack from privacy advocates because of a misunderstanding about what it actually is and a valid concern about how it's generally done. This article shows how technology from the security community can change data mining for the better, providing all its benefits while still maintaining privacy.