Author:
Gkoulalas-Divanis Aris,Haritsa Jayant,Kantarcioglu Murat
Publisher
Springer International Publishing
Reference57 articles.
1. O. Abul, F. Bonchi, and F. Giannotti. Hiding sequential and spatiotemporal patterns. IEEE Transactions on Knowledge and Data Engineering, 22(12):1709–1723, 2010.
2. N. Adam and J. Worthmann. Security control methods for statistical databases: A comparative study. ACM Computing Surveys, 21(4):515–556, Dec. 1989.
3. D. Agrawal and C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS, pages 247–255, 2001.
4. S. Agrawal and J. Haritsa. A framework for high-accuracy privacy-preserving mining. In Proceedings of the 21st IEEE International Conference on Data Engineering, ICDE, pages 193–204, 2005.
5. R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, pages 487–499, 1994.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献