1 |
H. Jin et al., "Privacy-Preserving Sequential Pattern Release," Proc. PAKDD, 2007, pp. 547-554.
|
2 |
M. Atzori et al., "Towards Low-Perturbation Anonymity Preserving Pattern Discovery," Proc. SAC, 2006, pp. 588-592.
|
3 |
K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 929-106.
|
4 |
A. Hyvarinen, J. Karhunen, and E. Oja, "Independent Component Analysis," Proc. Conf. Uncertainty in Artificial Intelligence, 2000, pp. 21-30.
|
5 |
N. Zhang, W. Zhao, and J. Chen, "Performance Measurements for Privacy Preserving Data Mining," Proc. PAKDD, 2005, pp. 43-49.
|
6 |
N Zhang, S. Wang, and W. Zhao, "A New Scheme on Privacy-Preserving Data Classification," Proc. KDD, 2005, pp. 374-383.
|
7 |
L. Xiong, S. Chitti, and L. Liu, "Mining Multiple Private Databases Using a kNN Classifier," Proc. SAC, 2007, pp. 435-440.
|
8 |
H. Kargupta, K. Das, and K. Liu, "Multi-Party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework," Proc. PKDD, 2007, pp. 523-531.
|
9 |
H. Garcia-Molina, J.D. Ullman, and J. Widom, Database Systems: The Complete Book, Prentice Hall, 2001, pp. 61-65.
|
10 |
S.K. Gupta, K.S. Rao, and V. Bhatnagar, "K-Means Clustering for Categorical Attributes," Proc. DaWaK, 1999, pp. 203-208.
|
11 |
A. Evfimievski et al., "Privacy Preserving Mining of Association Rules," Proc. KDD, 2002, pp. 217-228.
|
12 |
J.L. Lin and J.Y.C. Liu, "Privacy Preserving Itemset Mining through Fake Transactions," Proc. SAC, 2007, pp. 375-379.
|
13 |
A. Mohaisen and D. Hong, "Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering," ETRI J., vol. 30, no. 6, 2008, pp. 868-870.
DOI
ScienceOn
|
14 |
K. Chen and L. Liu, "Privacy Preserving Data Classification with Rotation Perturbation," Proc. ICDM, 2005, pp. 589-592.
|
15 |
S.R.M. Oliveira and O.R. Zaïane, "Achieving Privacy Preservation When Sharing Data for Clustering," Proc. SDM, 2004, pp. 67-82.
|
16 |
K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 92-106.
DOI
|
17 |
E. Bertino, I. Fovino, and L.P. Provenza, "A Framework for Evaluating Privacy Preserving Data Mining Algorithms," Data Min. Knowl. Discov., vol. 11, no. 2, 2005, pp. 121-154.
DOI
ScienceOn
|
18 |
S. Guo and X. Wu, "Deriving Private Information from Arbitrarily Projected Data," Proc. PAKDD, 2007, pp. 84-95.
|
19 |
M. Goebel and L. Gruenwald, "A Survey of Data Mining and Knowledge Discovery Software Tools," SIGKDD Explorations, vol. 1, no. 1, 1999, pp. 20-33.
DOI
|
20 |
M. F. Mokbel, "Privacy in Location-Based Services: State-of-the-Art and Research Directions," Proc. MDM, 2007, pp. 228-229.
|
21 |
R. Agrawal and R. Srikant, "Privacy Preserving Data Mining," Proc. ACM SIGMOD, 2000, pp. 439-450.
|