Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
State-of-the-art in privacy preserving data mining
ACM SIGMOD Record
Data Privacy through Optimal k-Anonymization
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
A new scheme on privacy-preserving data classification
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
An Empirical Study of Utility Measures for k-Anonymisation
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Privacy risks in health databases from aggregate disclosure
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Preserving Privacy in Time Series Data Classification by Discretization
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Query privacy in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
On privacy in time series data mining
PAKDD'08 Proceedings of the 12th Pacific-Asia conference on Advances in knowledge discovery and data mining
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
Computers & Mathematics with Applications
A new class of attacks on time series data mining\m{1}
Intelligent Data Analysis
Grammar encoding in DNA-like secret sharing infrastructure
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
A context-aware scheme for privacy-preserving location-based services
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy and utility for defect prediction: experiments with MORPH
Proceedings of the 34th International Conference on Software Engineering
Hi-index | 4.10 |
Although successful in many applications, data mining poses special concerns for private data. An integrated architecture takes a systemic view of the problem, implementing established protocols for data collection, inference control, and information sharing.