1 |
F. Emekci, O. D. Sahin, D. Agrawal and A. El Abbadi, "Privacy preserving decision tree learning over multiple parties," Data and Knowledge Engineering, vol. 63, pp. 348-361, Oct, 2007.
DOI
ScienceOn
|
2 |
M. Ester, H.P. Kriegel, J. Sander, and X. Xu, "A density-based algorithm for discovering clusters in large spatial databases with noise," Proc. 2nd Int. Conf. on Knowledge Discovery and Data Mining, Portland, OR, pp.226-231, Aug, 1996.
|
3 |
X. Ge, L. Yan, J. Zhu, and W. Shi, "Privacy-preserving distributed association rule mining based on the secret sharing technique," Software Engineering and Data Mining(SEDM), 2010 2nd International Conference, pp. 345-350, Jun, 2010.
|
4 |
X. Ge, and J. Zhu, New Fundamental Technologies in Data Mining, InTech, Jun, 2011.
|
5 |
B. Gilburd, A. Schuster, and R. Wolff, "k-TTP: A new privacy model for largescale distributed environments," Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 563-568, Aug, 2004.
|
6 |
B. Geothals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On private scalar product computation for privacy-preserving data mining," ICISC 2004, LNCS 3506, pp. 104-120, Dec, 2005.
|
7 |
J. Han, and M. Kamber, "Data Mining: concepts and techniques," Morgan Kaufmann Publishers, 2001.
|
8 |
A. Inan, S. V. Kaya, Y. Saygin, E. Savas, A. A. Hintoglu, and A. Levi, "Privacy preserving clustering on horizontally partitioned data," The Data and Knowledge Engineering (DKE), vol. 63, no. 3, pp. 646-666, Dec, 2007.
DOI
ScienceOn
|
9 |
J. Kim, and W. Winkler, "Multiplicative noise for masking continuous data," Technical Report Statistics #2003-01, Statistical Research Division, U.S. Bureau of the Census, Washington D.C, Apr, 2003.
|
10 |
X. B. Li, and S. Sarkar, "A tree-based data perturbation approach for privacy-preserving data mining," IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 9, pp. 1278-1283, Sep, 2006.
DOI
ScienceOn
|
11 |
K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy-preserving data mining," PKDD, pp. 297-308, Sep, 2006.
|
12 |
D. Agrawal, and C.C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," The 20th ACM Symposium on Principles of Database Systems,Santa Barbara, CA, pp. 247-255, May, 2001.
|
13 |
R. Agrawal, T. Imielinski, A. Swami, "Mining association rules between sets of items in large databases," Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 207-216, May, 1993.
|
14 |
R. Agrawal, and R. Srikant, "Privacypreserving data mining," The 19th ACM SIGMOD Conference on Management of Data, pp. 439-450, May, 2000.
|
15 |
C. Clifton, M. Kantarcioglu, and J. Vaidya, "Defining privacy for data mining," Proceeding of the National Science Foundation Workshop on Next Generation Data Mining, pp. 126-133, Nov, 2002.
|
16 |
W. Du, and Z. Zhan, "Building decision tree classifier on private data," IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 1-8, Dec, 2002.
|
17 |
D. W. Cheung, J. Han, V. T. Ng, A. W. Fu, and Y. Fu, "A fast distributed algorithm for mining association rules," In Proceedings of the 1996 International Conference on Parallel and Distributed Information Systems, Dec, 1996.
|
18 |
E. Dasseni, V. S. Verykios, A. K. Elmagarmid, and E. Bertino, "Hiding association rules by using confidence and support," In Proceedings of the 4th Information Hiding Workshop, pp. 369-383, Apr, 2001.
|
19 |
W. Du, and M. Atallah, "Privacy-preserving cooperative statistical analysis," In Proceeding of the 17th Annual Computer Security Applications Conference, pp. 102-110, Dec, 2001.
|
20 |
Y. Lindell, and B. Pinkas, "Secure multiparty computation for privacy-preserving data mining," Journal of Privacy and Confidentiality, vol. 1(1), pp. 59-98, Apr, 2009.
|
21 |
K. Muralidhar, and R. Sarathy, "Data shuffling a new masking approach for numerical data," Management Science, vol. 52, no. 5, pp. 658-670, May, 2006.
DOI
ScienceOn
|
22 |
G. Nayak, and S. Devi, "A survey on privacy preserving data mining: approaches and techniques," International Journal of Engineering Science and Technology (IJEST), vol. 3(3), pp. 2127-2133, Mar, 2011.
|
23 |
S. T. M. Oliveira, and O. R. Zaiane, "Privacy preserving frequent itemset mining," In Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining, pp. 43-54, Dec, 2002.
|
24 |
M. O. Rabin, "How to exchange secrets by oblivious transfer," Technical Report TR-81, Aiken Computation Laboratory, May, 1981.
|
25 |
A. Shamir, "How to share a secret," Communications of the ACM, vol.22(11), pp. 612-613, Nov, 1979.
DOI
ScienceOn
|
26 |
L. Sweeney, "k-Anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557-570, Oct, 2002.
DOI
ScienceOn
|
27 |
J. Vaidya, and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," In The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 206-215, Aug, 2003.
|
28 |
D. Trinca, and S. Rajasekaran, "Towards a collusion-resistant algebraic multiparty protocol for privacy-preserving association rule mining in vertically partitioned data," Performance, Computing, and Communications Conference, IPCCC 2007, IEEE International, pp. 402-409, Apr, 2007.
|
29 |
Pang-Ning Tan, M. Steinbach, and V. Kumar, Introduction to data mining, Pearson, Mar, 2006.
|
30 |
J. Vaidya, and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," In The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639-644, Jul, 2002.
|
31 |
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-the-art in privacy preserving data mining," SIGMOD Record, vol. 33, no. 1, pp. 50-57, Mar, 2004.
DOI
ScienceOn
|
32 |
A. C. C. Yao, "How to generate and exchange secrets," Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167, Oct, 1986.
|