References
- M. F. Mokbel, "Privacy in Location-Based Services: State-of-the-Art and Research Directions," Proc. MDM, 2007, pp. 228-229.
- M. Goebel and L. Gruenwald, "A Survey of Data Mining and Knowledge Discovery Software Tools," SIGKDD Explorations, vol. 1, no. 1, 1999, pp. 20-33. https://doi.org/10.1145/846170.846172
- R. Agrawal and R. Srikant, "Privacy Preserving Data Mining," Proc. ACM SIGMOD, 2000, pp. 439-450.
- A. Mohaisen and D. Hong, "Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering," ETRI J., vol. 30, no. 6, 2008, pp. 868-870. https://doi.org/10.4218/etrij.08.0208.0134
- S.R.M. Oliveira and O.R. Zaïane, "Achieving Privacy Preservation When Sharing Data for Clustering," Proc. SDM, 2004, pp. 67-82.
- K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 92-106. https://doi.org/10.1109/TKDE.2006.14
- E. Bertino, I. Fovino, and L.P. Provenza, "A Framework for Evaluating Privacy Preserving Data Mining Algorithms," Data Min. Knowl. Discov., vol. 11, no. 2, 2005, pp. 121-154. https://doi.org/10.1007/s10618-005-0006-6
- K. Chen and L. Liu, "Privacy Preserving Data Classification with Rotation Perturbation," Proc. ICDM, 2005, pp. 589-592.
- S. Guo and X. Wu, "Deriving Private Information from Arbitrarily Projected Data," Proc. PAKDD, 2007, pp. 84-95.
- N. Zhang, W. Zhao, and J. Chen, "Performance Measurements for Privacy Preserving Data Mining," Proc. PAKDD, 2005, pp. 43-49.
- N Zhang, S. Wang, and W. Zhao, "A New Scheme on Privacy-Preserving Data Classification," Proc. KDD, 2005, pp. 374-383.
- H. Kargupta, K. Das, and K. Liu, "Multi-Party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework," Proc. PKDD, 2007, pp. 523-531.
- H. Garcia-Molina, J.D. Ullman, and J. Widom, Database Systems: The Complete Book, Prentice Hall, 2001, pp. 61-65.
- S.K. Gupta, K.S. Rao, and V. Bhatnagar, "K-Means Clustering for Categorical Attributes," Proc. DaWaK, 1999, pp. 203-208.
- L. Xiong, S. Chitti, and L. Liu, "Mining Multiple Private Databases Using a kNN Classifier," Proc. SAC, 2007, pp. 435-440.
- A. Evfimievski et al., "Privacy Preserving Mining of Association Rules," Proc. KDD, 2002, pp. 217-228.
- J.L. Lin and J.Y.C. Liu, "Privacy Preserving Itemset Mining through Fake Transactions," Proc. SAC, 2007, pp. 375-379.
- H. Jin et al., "Privacy-Preserving Sequential Pattern Release," Proc. PAKDD, 2007, pp. 547-554.
- M. Atzori et al., "Towards Low-Perturbation Anonymity Preserving Pattern Discovery," Proc. SAC, 2006, pp. 588-592.
- K. Liu, H. Kargupta, and J. Ryan, "Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, 2006, pp. 929-106.
- A. Hyvarinen, J. Karhunen, and E. Oja, "Independent Component Analysis," Proc. Conf. Uncertainty in Artificial Intelligence, 2000, pp. 21-30.
Cited by
- Privacy Preserving Clustering for Distributed Homogeneous Gene Expression Data Sets : vol.1, pp.3, 2010, https://doi.org/10.4018/jcmam.2010070102
- An Immersive Augmented-Reality-Based e-Learning System Based on Dynamic Threshold Marker Method vol.35, pp.6, 2010, https://doi.org/10.4218/etrij.13.2013.0081