An Attacker’s View of Distance Preserving Maps for Privacy Preserving Data Mining
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 297-308
- https://doi.org/10.1007/11871637_30
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Random projection-based multiplicative data perturbation for privacy preserving distributed data miningIEEE Transactions on Knowledge and Data Engineering, 2005
- Deriving private information from randomized dataPublished by Association for Computing Machinery (ACM) ,2005
- Random-data perturbation techniques and privacy-preserving data miningKnowledge and Information Systems, 2005
- Association rule hidingIEEE Transactions on Knowledge and Data Engineering, 2004
- A Privacy-Preserving Index for Range QueriesPublished by Elsevier BV ,2004
- Limiting privacy breaches in privacy preserving data miningPublished by Association for Computing Machinery (ACM) ,2003
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACYInternational Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002
- Maintaining Data Privacy in Association Rule MiningPublished by Elsevier BV ,2002
- Privacy-preserving data miningACM SIGMOD Record, 2000
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989