{"title":"A Survey of Inference Control Methods for Privacy-Preserving Data Mining","authors":"J. Domingo-Ferrer","doi":"10.1007/978-0-387-70992-5_3","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_3","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining","authors":"Keke Chen, Ling Liu","doi":"10.1007/978-0-387-70992-5_7","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_7","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123742272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Quantification of Privacy Preserving Data Mining Algorithms","authors":"E. Bertino, D. Lin, Wei Jiang","doi":"10.1007/978-0-387-70992-5_8","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_8","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data","authors":"Murat Kantarcioglu","doi":"10.1007/978-0-387-70992-5_13","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_13","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133616770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measures of Anonymity","authors":"Suresh Venkatasubramanian","doi":"10.1007/978-0-387-70992-5_4","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_4","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms","authors":"Kobbi Nissim","doi":"10.1007/978-0-387-70992-5_16","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_16","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Association Rule Hiding Methods for Privacy","authors":"Vassilios S. Verykios, A. Gkoulalas-Divanis","doi":"10.1007/978-0-387-70992-5_11","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_11","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115958796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving Data Stream Classification","authors":"Yabo Xu, Ke Wang, A. Fu, R. She, J. Pei","doi":"10.1007/978-0-387-70992-5_20","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_20","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Introduction to Privacy-Preserving Data Mining","authors":"C. Aggarwal, Philip S. Yu","doi":"10.1007/978-0-387-70992-5_1","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_1","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Utility-based Privacy-Preserving Data Transformation Methods","authors":"Ming Hua, J. Pei","doi":"10.1007/978-0-387-70992-5_9","DOIUrl":"https://doi.org/10.1007/978-0-387-70992-5_9","url":null,"abstract":"","PeriodicalId":140538,"journal":{"name":"Privacy-Preserving Data Mining","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}