Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On the design and quantification of privacy preserving data mining algorithms
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Limiting privacy breaches in privacy preserving data mining
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
On the Privacy Preserving Properties of Random Data Perturbation Techniques
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Time series compressibility and privacy
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
From data privacy to location privacy: models and algorithms
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
The applicability of the perturbation based privacy preserving data mining for real-world data
Data & Knowledge Engineering
Ownership protection of shape datasets with geodesic distance preservation
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Privacy-preserving cox regression for survival analysis
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving classification of vertically partitioned data via random kernels
ACM Transactions on Knowledge Discovery from Data (TKDD)
Data privacy protection in multi-party clustering
Data & Knowledge Engineering
Privacy Preserving Market Basket Data Analysis
PKDD 2007 Proceedings of the 11th European conference on Principles and Practice of Knowledge Discovery in Databases
PoolView: stream privacy for grassroots participatory sensing
Proceedings of the 6th ACM conference on Embedded network sensor systems
Disclosure Analysis and Control in Statistical Databases
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Knowledge and Information Systems
Position transformation: a location privacy protection method for moving objects
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
An efficient online auditing approach to limit private data disclosure
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Privacy preserving churn prediction
Proceedings of the 2009 ACM symposium on Applied Computing
Location Privacy in Moving-Object Environments
Transactions on Data Privacy
A distributed approach to enabling privacy-preserving model-based classifier training
Knowledge and Information Systems
Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Privacy-preserving backpropagation neural network learning
IEEE Transactions on Neural Networks
Deriving private information from arbitrarily projected data
PAKDD'07 Proceedings of the 11th Pacific-Asia conference on Advances in knowledge discovery and data mining
Privacy preserving clustering for multi-party
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
ICNC'09 Proceedings of the 5th international conference on Natural computation
Privacy-preserving outsourcing support vector machines with random transformation
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy disclosure analysis and control for 2D contingency tables containing inaccurate data
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
ACM Transactions on Database Systems (TODS)
Revisiting sequential pattern hiding to enhance utility
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
A constraint satisfaction cryptanalysis of bloom filters in private record linkage
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Non-metric multidimensional scaling for privacy-preserving data clustering
IDEAL'11 Proceedings of the 12th international conference on Intelligent data engineering and automated learning
Privacy preservation by independent component analysis and variance control
Proceedings of the 20th ACM international conference on Information and knowledge management
Optimized two party privacy preserving association rule mining using fully homomorphic encryption
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
An attacker's view of distance preserving maps for privacy preserving data mining
PKDD'06 Proceedings of the 10th European conference on Principle and Practice of Knowledge Discovery in Databases
Emergency Access Authorization for Personally Controlled Online Health Care Data
Journal of Medical Systems
Disclosure analysis for two-way contingency tables
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Right-protected data publishing with hierarchical clustering preservation
Proceedings of the 21st ACM international conference on Information and knowledge management
Retention replacement in privacy preserving classification
ADBIS'12 Proceedings of the 16th East European conference on Advances in Databases and Information Systems
Breaching Euclidean distance-preserving data perturbation using few known inputs
Data & Knowledge Engineering
Cloud-enabled privacy-preserving collaborative learning for mobile sensing
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification
International Journal of Information Security and Privacy
Bands of privacy preserving objectives: classification of PPDM strategies
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Secure k-NN computation on encrypted cloud data without sharing key with query users
Proceedings of the 2013 international workshop on Security in cloud computing
A Privacy Preserving Markov Model for Sequence Classification
Proceedings of the International Conference on Bioinformatics, Computational Biology and Biomedical Informatics
Privacy-preserving Kruskal-Wallis test
Computer Methods and Programs in Biomedicine
Secure k-NN query on encrypted cloud database without key-sharing
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
Data perturbation techniques are one of the most popular models for privacy preserving data mining [3, 1]. It is especially convenient for applications where the data owners need to export/publish the privacy-sensitive data. A data perturbation procedure can be simply described as follows. Before the data owner publishes the data, they randomly change the data in certain way to disguise the sensitive information while preserving the particular data property that is critical for building the data models. Several perturbation techniques have been proposed recently, among which the most typical ones are randomization approach [3] and condensation approach [1].