A survey: deriving private information from perturbed data

BD Okkalioglu, M Okkalioglu, M Koc, H Polat - Artificial Intelligence Review, 2015 - Springer
Privacy-preserving data mining has attracted the attention of a large number of researchers.
Many data perturbation methods have been proposed to ensure individual privacy. Such …

A taxonomy of 3D occlusion management techniques

N Elmqvist, P Tsigas - 2007 IEEE Virtual Reality Conference, 2007 - ieeexplore.ieee.org
While an important factor in depth perception, the occlusion effect in 3D environments also
has a detrimental impact on tasks involving discovery, access, and spatial relation of objects …

A survey on privacy preserving approaches in data publishing

Y Zhao, M Du, J Le, Y Luo - 2009 First International Workshop …, 2009 - ieeexplore.ieee.org
Privacy preserving in data publishing has become one of the most important research topics
in data security field and it has become a serious concern in publication of personal data in …

Peer-to-peer secure multi-party numerical computation

D Bickson, D Dolev, G Bezman… - … Conference on Peer-to …, 2008 - ieeexplore.ieee.org
We propose an efficient framework for enabling secure multi-party numerical computations
in a Peer-to-Peer network. This problem arises in a range of applications such as …

[PDF][PDF] Privacy preserving data mining techniques: Challenges and issues

H Chhinkaniwala, S Garg - Proceedings of International …, 2011 - researchgate.net
Privacy preserving becomes an important issue in the development of various data mining
techni'ques. In this paper, we have discussed various techniques to preserve privacy while …

A privacy review of vertically partitioned data-based PPCF schemes

M Okkalioglu, M Koc, H Polat - International Journal of Information …, 2016 - dergipark.org.tr
E-commerce companies utilize collaborative filtering approaches to provide
recommendation in order to attract customers. Consumer participation through supplying …

Peer-to-peer secure multi-party numerical computation facing malicious adversaries

D Bickson, T Reinman, D Dolev, B Pinkas - Peer-to-peer networking and …, 2010 - Springer
We propose an efficient framework for enabling secure multi-party numerical computations
in a Peer-to-Peer network. This problem arises in a range of applications such as …

A privacy attack that removes the majority of the noise from perturbed data

M Sramka - The 2010 international joint conference on neural …, 2010 - ieeexplore.ieee.org
Data perturbation is a sanitization method that helps restrict the disclosure of sensitive
information from published data. We present an attack on the privacy of the published data …

Discovering sequential patterns from medical datasets

MY Alzahrani, FA Mazarbhuiya - … International Conference on …, 2016 - ieeexplore.ieee.org
Sequential patterns mining from data is a well stated data mining problem. It has a number
of applications such as DNA sequencing, signal processing, speech analysis etc. In this …

[PDF][PDF] Contemporary trends in privacy preserving collaborative data mining-a survey

A Shah, R Gulati - … of the 2015 International Conference on …, 2015 - researchgate.net
Growing concerns amongst the competitors for maintaining the privacy of their customer's
information has increased in recent years. Multiple parties desire to collaborate to conduct …