1 |
Kun Liu, Hillol Kargupta, and Jessica Ryan, 'Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining', IEEE Transactions on Knowledge and Data Engineering archive, Vol. 18, Issue 1, 2006
|
2 |
A. Evfimievski, J. Gehrke, and R. Srikant, 'Limiting Privacy Breaches in Privacy Preserving Data Mining', Proc. of ACM Symp. on Principles of Database Systems (PODS), 2003
|
3 |
D. Agrawal, C. C. Agrawal, 'On the design and quantification of privacy preserving data mining algorithms', Proceedings of the 20th Symposium on Principles of Database Systems, May 2001
|
4 |
Jim Dowd, Shouhuai Xu, and Weining Zhang, 'Privacy-Preserving Decision Tree Mining Based on Random Substitutions', ETRICS2006, LNCS 3995, Springer-Verlag, pp. 145-159, 2006
|
5 |
S. Agrawal, and J. Haritsa, 'A Framework for High-Accuracy Privacy-Preserving Mining', Proc. of ICDE 2005, 2005
|
6 |
S. Agrawal, and J. Haritsa, 'A framework for high-accuracy privacy-preserving mining', Technical Report TR-2004-02, Database Systems Lab, Indian Institute of Science, 2004. (http://dsl.serc.iisc.ermet.in/pub/TR/R-2004-02.pdf)
|
7 |
Y. Wang, 'On the number of success in independent trials', Statistica Silica 3, 1993
|
8 |
R. Agrawal, R. Srikant, 'Privacy preserving data mining', ACM SIGMOD Conference on Management of Data, Dallas, TX, 2000, pp. 439-450
|
9 |
C. D. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM(Society for Industrial and Applied Mathematics), Philadelphia, 2000
|
10 |
Keke Chen, and Ling Liu, 'Privacy-Preserving Data Classification with Rotation Perturbation', Proc. of IEEE Intl. Conf. on Data Mining (ICDM05), 2005
|