Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
Privacy-preserving data publishing: A survey of recent developments
The collection of digital information by governments, corporations, and individuals has
created tremendous opportunities for knowledge-and information-based decision making …
created tremendous opportunities for knowledge-and information-based decision making …
Data Mining The Text Book
C Aggarwal - 2015 - Springer
This textbook explores the different aspects of data mining from the fundamentals to the
complex data types and their applications, capturing the wide diversity of problem domains …
complex data types and their applications, capturing the wide diversity of problem domains …
t-closeness: Privacy beyond k-anonymity and l-diversity
The k-anonymity privacy requirement for publishing microdata requires that each
equivalence class (ie, a set of records that are indistinguishable from each other with respect …
equivalence class (ie, a set of records that are indistinguishable from each other with respect …
[KİTAP][B] A general survey of privacy-preserving data mining models and algorithms
CC Aggarwal, PS Yu - 2008 - Springer
In recent years, privacy-preserving data mining has been studied extensively, because of
the wide proliferation of sensitive information on the internet. A number of algorithmic …
the wide proliferation of sensitive information on the internet. A number of algorithmic …
Pufferfish: A framework for mathematical privacy definitions
In this article, we introduce a new and general privacy framework called Pufferfish. The
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Pufferfish framework can be used to create new privacy definitions that are customized to the …
Privacy: Theory meets practice on the map
In this paper, we propose the first formal privacy analysis of a data anonymization process
known as the synthetic data generation, a technique becoming popular in the statistics …
known as the synthetic data generation, a technique becoming popular in the statistics …
Llm-pbe: Assessing data privacy in large language models
Large Language Models (LLMs) have become integral to numerous domains, significantly
advancing applications in data management, mining, and analysis. Their profound …
advancing applications in data management, mining, and analysis. Their profound …
Overview and framework for data and information quality research
Awareness of data and information quality issues has grown rapidly in light of the critical role
played by the quality of information in our data-intensive, knowledge-based economy …
played by the quality of information in our data-intensive, knowledge-based economy …
K-isomorphism: privacy preserving network publication against structural attacks
J Cheng, AW Fu, J Liu - Proceedings of the 2010 ACM SIGMOD …, 2010 - dl.acm.org
Serious concerns on privacy protection in social networks have been raised in recent years;
however, research in this area is still in its infancy. The problem is challenging due to the …
however, research in this area is still in its infancy. The problem is challenging due to the …