Privacy Preserving Data Mining
Citations
[...]
13,246 citations
3,780 citations
3,629 citations
Cites background from "Privacy Preserving Data Mining"
...Several privacy definitions have been put forward since Agrawal and Srikant (2000)....
[...]
...The work of Agrawal and Srikant Agrawal and Srikant (2000) rekindled this interest; their principal contribution was an algorithm that, given an input-perturbed database, learns the original input distribution....
[...]
3,314 citations
Additional excerpts
...We then show some interesting applications of these techniques, presenting algorithms for three specific tasks and three general results on differentially private learning....
[...]
2,944 citations
References
17,177 citations
[...]
13,246 citations
"Privacy Preserving Data Mining" refers background in this paper
...It is interesting to note that if Steps 1 and 2 of the protocol are switched (as the algorithm is in fact presented in [12]), then it is no longer private....
[...]
...(The examples are taken from Chapter 3 of Mitchell’s book Machine Learning, see [12]....
[...]
...The presentation here is rather simplistic and very brief and we refer the reader to [12] for an in-depth treatment of the subject....
[...]
...This is non-trivial and in fact, as we remark below, were we to switch Steps 1 and 2 in the protocol (as the algorithm is in fact presented in [12]) the protocol would no longer be private....
[...]
8,777 citations
7,008 citations
"Privacy Preserving Data Mining" refers methods in this paper
...It can be converted to one which computes P (z) using the methods of Paillier [18], who presented a trapdoor for computing discrete logs....
[...]
...[18] P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuocity Classes....
[...]
...It can be converted to one which computes P (z) using the methodsof Paillier [18], who presented a trapdoor for computing discrete logs....
[...]
3,579 citations