Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
Algorithms on strings, trees, and sequences: computer science and computational biology
Algorithms on strings, trees, and sequences: computer science and computational biology
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Data Warehousing and Data Mining for Telecommunications
Data Warehousing and Data Mining for Telecommunications
Machine Learning
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
Data streams: algorithms and applications
Foundations and Trends® in Theoretical Computer Science
Privacy preserving sequential pattern mining in distributed databases
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Two methods for privacy preserving data mining with malicious participants
Information Sciences: an International Journal
Secure two-party k-means clustering
Proceedings of the 14th ACM conference on Computer and communications security
Oblivious neural network computing via homomorphic encryption
EURASIP Journal on Information Security
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Guided perturbation: towards private and accurate mining
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-preserving reinforcement learning
Proceedings of the 25th international conference on Machine learning
Privacy-preserving decision trees over vertically partitioned data
ACM Transactions on Knowledge Discovery from Data (TKDD)
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
Privacy Preserving DBSCAN Algorithm for Clustering
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases
ADMA '07 Proceedings of the 3rd international conference on Advanced Data Mining and Applications
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
Information Security and Cryptology
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Privacy Preserving Data Mining within Anonymous Credential Systems
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
An efficient protocol for private and accurate mining of support counts
Pattern Recognition Letters
Privacy-preserving data mining in the malicious model
International Journal of Information and Computer Security
Privacy-Preserving Clustering with High Accuracy and Low Time Complexity
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Privacy-Preserving Face Recognition
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
3PRS: a personalized popular program recommendation system for digital TV for P2P social networks
Multimedia Tools and Applications
Secure two and multi-party association rule mining
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
Communication-Efficient Privacy-Preserving Clustering
Transactions on Data Privacy
Two-party privacy-preserving agglomerative document clustering
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Privacy-preserving linear fisher discriminant analysis
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Large-scale k-means clustering with user-centric privacy preservation
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
Phoenix: privacy preserving biclustering on horizontally partitioned data
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Towards privacy-preserving model selection
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Efficient privacy-preserving data mining in malicious model
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
Privacy-preserving data mining in presence of covert adversaries
ADMA'10 Proceedings of the 6th international conference on Advanced data mining and applications: Part I
Sub-linear, secure comparison with two non-colluding parties
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Journal of Computer and System Sciences
Privacy-preserving data mining: a game-theoretic approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Privacy preserving feature selection for distributed data using virtual dimension
Proceedings of the 20th ACM international conference on Information and knowledge management
Evaluating peer behaviour in distributed participatory sensing
WSEAS Transactions on Computers
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Arbitrarily distributed data-based recommendations with privacy
Data & Knowledge Engineering
More on shared-scalar-product protocols
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Privacy preserving BIRCH algorithm for clustering over vertically partitioned databases
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Efficient privacy preserving k-means clustering
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Distributed data mining protocols for privacy: a review of some recent results
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Distributed privacy-preserving methods for statistical disclosure control
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Secure computation, i/o-efficient algorithms and distributed signatures
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Privacy preserving distributed DBSCAN clustering
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy-preserving ranking over vertically partitioned data
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Privacy-Preserving EM algorithm for clustering on social network
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part I
Privacy-preserving subgraph discovery
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Secure two-party computations in ANSI C
Proceedings of the 2012 ACM conference on Computer and communications security
Privacy-preserving genetic algorithms for rule discovery
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Privacy-preserving self-organizing map
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Estimating NBC-based recommendations on arbitrarily partitioned data with privacy
Knowledge-Based Systems
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
Preserving Privacy in Time Series Data Mining
International Journal of Data Warehousing and Mining
A privacy framework: indistinguishable privacy
Proceedings of the Joint EDBT/ICDT 2013 Workshops
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
A cloud-based intelligent TV program recommendation system
Computers and Electrical Engineering
Distributed and Parallel Databases
Hi-index | 0.00 |
Advances in computer networking and database technologies have enabled the collection and storage of vast quantities of data. Data mining can extract valuable knowledge from this data, and organizations have realized that they can often obtain better results by pooling their data together. However, the collected data may contain sensitive or private information about the organizations or their customers, and privacy concerns are exacerbated if data is shared between multiple organizations.Distributed data mining is concerned with the computation of models from data that is distributed among multiple participants. Privacy-preserving distributed data mining seeks to allow for the cooperative computation of such models without the cooperating parties revealing any of their individual data items. Our paper makes two contributions in privacy-preserving data mining. First, we introduce the concept of arbitrarily partitioned data, which is a generalization of both horizontally and vertically partitioned data. Second, we provide an efficient privacy-preserving protocol for k-means clustering in the setting of arbitrarily partitioned data.