Numerical methods for scientists and engineers (2nd ed.)
Numerical methods for scientists and engineers (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Cryptographic techniques for privacy-preserving data mining
ACM SIGKDD Explorations Newsletter
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Privacy preserving mining of association rules
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Using randomized response techniques for privacy-preserving data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
k-TTP: a new privacy model for large-scale distributed environments
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
When do data mining results violate privacy?
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy preserving regression modelling via distributed computation
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Privacy-Sensitive Bayesian Network Parameter Learning
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Maintaining data privacy in association rule mining
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Privacy Preserving Data Classification with Rotation Perturbation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
A privacy-preserving collaborative filtering scheme with two-way communication
EC '06 Proceedings of the 7th ACM conference on Electronic commerce
On the use of spectral filtering for privacy preserving data mining
Proceedings of the 2006 ACM symposium on Applied computing
Privacy leakage in multi-relational databases: a semi-supervised learning perspective
The VLDB Journal — The International Journal on Very Large Data Bases
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
IEEE Pervasive Computing
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Providing k-anonymity in data mining
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Searching for Better Randomized Response Schemes for Privacy-Preserving Data Mining
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Generalization-Based Privacy-Preserving Data Collection
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Knowledge and Information Systems
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy-Preserving Clustering with High Accuracy and Low Time Complexity
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining
PAKDD '09 Proceedings of the 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Information Sciences: an International Journal
Attacks on privacy and deFinetti's theorem
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Reconstructing Data Perturbed by Random Projections When the Mixing Matrix Is Known
ECML PKDD '09 Proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: Part II
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Optimal random perturbation at multiple privacy levels
Proceedings of the VLDB Endowment
Publishing naive Bayesian classifiers: privacy without accuracy loss
Proceedings of the VLDB Endowment
Privacy Preserving Categorical Data Analysis with Unknown Distortion Parameters
Transactions on Data Privacy
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
Hide-and-Lie: enhancing application-level privacy in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Deriving private information from arbitrarily projected data
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy preserving linear discriminant analysis from perturbed data
Proceedings of the 2010 ACM Symposium on Applied Computing
On addressing accuracy concerns in privacy preserving association rule mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Non-homogeneous generalization in privacy preserving data publishing
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Preserving privacy in participatory sensing systems
Computer Communications
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Publishing time-series data under preservation of privacy and distance orders
DEXA'10 Proceedings of the 21st international conference on Database and expert systems applications: Part II
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
ACM Transactions on Database Systems (TODS)
RASP: efficient multidimensional range query on attack-resilient encrypted databases
Proceedings of the first ACM conference on Data and application security and privacy
REBIVE: a reliable private data aggregation scheme for wireless sensor networks
Proceedings of the 2011 ACM Symposium on Applied Computing
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Non-black-box computation of linear regression protocols with malicious adversaries
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
A survey on privacy in mobile participatory sensing applications
Journal of Systems and Software
Preserving privacy in wireless sensor networks using reliable data aggregation
ACM SIGAPP Applied Computing Review
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Privacy-preserving decision tree mining based on random substitutions
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Privacy-Preserving SVM classification on vertically partitioned data
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Recent research on privacy preserving data mining
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A privacy-protecting architecture for collaborative filtering via forgery and suppression of ratings
DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Multi-agent based middleware for protecting privacy in IPTV content recommender services
Multimedia Tools and Applications
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
A scalable privacy-preserving recommendation scheme via bisecting k-means clustering
Information Processing and Management: an International Journal
Integer partitioning based encryption for privacy preservation in data mining
Proceedings of the First International Conference on Security of Internet of Things
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Privacy-preserving Kruskal-Wallis test
Computer Methods and Programs in Biomedicine
Distributed and Parallel Databases
Hi-index | 0.03 |
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et al. challenged the randomization schemes, and they pointed out that randomization might not be able to preserve privacy. However, it is still unclear what factors cause such a security breach, how they affect the privacy preserving property of the randomization, and what kinds of data have higher risk of disclosing their private contents even though they are randomized.We believe that the key factor is the correlations among attributes. We propose two data reconstruction methods that are based on data correlations. One method uses the Principal Component Analysis (PCA) technique, and the other method uses the Bayes Estimate (BE) technique. We have conducted theoretical and experimental analysis on the relationship between data correlations and the amount of private information that can be disclosed based our proposed data reconstructions schemes. Our studies have shown that when the correlations are high, the original data can be reconstructed more accurately, i.e., more private information can be disclosed.To improve privacy, we propose a modified randomization scheme, in which we let the correlation of random noises "similar" to the original data. Our results have shown that the reconstruction accuracy of both PCA-based and BE-based schemes become worse as the similarity increases.