标题
Information Security in Big Data: Privacy and Data Mining
作者
关键词
-
出版物
IEEE Access
Volume 2, Issue -, Pages 1149-1176
出版商
Institute of Electrical and Electronics Engineers (IEEE)
发表日期
2014-10-10
DOI
10.1109/access.2014.2362522
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Anonymizing trajectory data for passenger flow analysis
- (2014) Moein Ghasemzadeh et al. TRANSPORTATION RESEARCH PART C-EMERGING TECHNOLOGIES
- Association rule hiding in risk management for retail supply chain collaboration
- (2013) Hai Quoc Le et al. COMPUTERS IN INDUSTRY
- Structural Diversity for Resisting Community Identification in Published Social Networks
- (2013) Chih-Hua Tai et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Identity Protection in Sequential Releases of Dynamic Networks
- (2013) Chih-Hua Tai et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- High utility K-anonymization for social network publishing
- (2013) Yazhe Wang et al. KNOWLEDGE AND INFORMATION SYSTEMS
- Structural Attack to Anonymous Graph of Social Networks
- (2013) Tieying Zhu et al. MATHEMATICAL PROBLEMS IN ENGINEERING
- Ensuring location diversity in privacy-preserving spatio-temporal data publishing
- (2013) A. Ercument Cicek et al. VLDB JOURNAL
- Association rule hiding methods
- (2013) Vassilios S. Verykios Wiley Interdisciplinary Reviews-Data Mining and Knowledge Discovery
- A Two-Stage Deanonymization Attack against Anonymized Social Networks
- (2012) Wei Peng et al. IEEE TRANSACTIONS ON COMPUTERS
- Incentive Compatible Privacy-Preserving Data Analysis
- (2012) Murat Kantarcioglu et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Equally contributory privacy-preserving k-means clustering over vertically partitioned data
- (2012) Xun Yi et al. INFORMATION SYSTEMS
- A classification of location privacy attacks and approaches
- (2012) Marius Wernke et al. Personal and Ubiquitous Computing
- Incentive Compatible Privacy-Preserving Distributed Classification
- (2011) Robert Nix et al. IEEE Transactions on Dependable and Secure Computing
- Privacy-preserving trajectory data publishing by local suppression
- (2011) Rui Chen et al. INFORMATION SCIENCES
- Privacy-preserving data publishing
- (2010) Benjamin C. M. Fung et al. ACM COMPUTING SURVEYS
- On the Design and Analysis of the Privacy-Preserving SVM Classifier
- (2010) Keng-Pei Lin et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- Privacy Preserving Decision Tree Learning Using Unrealized Data Sets
- (2010) Pui Kuen Fong et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
- k-Anonymization with Minimal Loss of Information
- (2009) A. Gionis et al. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now