Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preserving data mining: methods, metrics, and applications
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …
computing devices. The analysis of such information is fostering businesses and …
Electrical properties of the grain boundaries of oxygen ion conductors: acceptor-doped zirconia and ceria
X Guo, R Waser - Progress in Materials Science, 2006 - Elsevier
This article reviews the current understanding of the electrical properties of the grain
boundaries of acceptor-doped zirconia and ceria, however, with an emphasis on the grain …
boundaries of acceptor-doped zirconia and ceria, however, with an emphasis on the grain …
Differential privacy: A survey of results
C Dwork - International conference on theory and applications of …, 2008 - Springer
Over the past five years a new approach to privacy-preserving data analysis has born fruit
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …
[13, 18, 7, 19, 5, 37, 35, 8, 32]. This approach differs from much (but not all!) of the related …
Privacy-preserving data mining
A fruitful direction for future data mining research will be the development of techniques that
incorporate privacy concerns. Specifically, we address the following question. Since the …
incorporate privacy concerns. Specifically, we address the following question. Since the …
Revealing information while preserving privacy
I Dinur, K Nissim - Proceedings of the twenty-second ACM SIGMOD …, 2003 - dl.acm.org
We examine the tradeoff between privacy and usability of statistical databases. We model a
statistical database by an n-bit string d 1,.., dn, with a query being a subset q⊆[n] to be …
statistical database by an n-bit string d 1,.., dn, with a query being a subset q⊆[n] to be …
Privacy preserving mining of association rules
We present a framework for mining association rules from transactions consisting of
categorical items where the data has been randomized to preserve privacy of individual …
categorical items where the data has been randomized to preserve privacy of individual …
Query optimization in database systems
M Jarke, J Koch - ACM Computing surveys (CsUR), 1984 - dl.acm.org
These methods are presented in the framework of a general query evaluation procedure
using the relational calculus representation of queries. In addition, nonstandard query …
using the relational calculus representation of queries. In addition, nonstandard query …
Information sharing across private databases
Literature on information integration across databases tacitly assumes that the data in each
database can be revealed to the other databases. However, there is an increasing need for …
database can be revealed to the other databases. However, there is an increasing need for …
Hippocratic databases
Publisher Summary The Hippocratic Oath has guided the conduct of physicians for
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …
centuries. Inspired by its tenet of preserving privacy, it has been argued that future database …
Semantic database modeling: Survey, applications, and research issues
R Hull, R King - ACM Computing Surveys (CSUR), 1987 - dl.acm.org
Most common database management systems represent information in a simple record-
based format. Semantic modeling provides richer data structuring capabilities for database …
based format. Semantic modeling provides richer data structuring capabilities for database …