• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 438
Next 10 →

Revealing information while preserving privacy

by Irit Dinur, Kobbi Nissim - In PODS , 2003
"... We examine the tradeoff between privacy and usability of statistical databases. We model a statistical database by an n-bit string d1,.., dn, with a query being a subset q ⊆ [n] to be answered by � i∈q di. Our main result is a polynomial reconstruction algorithm of data from noisy (perturbed) subset ..."
Abstract - Cited by 272 (9 self) - Add to MetaCart
algorithms for statistical databases that preserve privacy while adding perturbation of magnitude Õ(√n). For time-T bounded adversaries we demonstrate a privacy-preserving access algorithm whose perturbation magnitude is ≈ √ T. 1

Privacy-preserving logistic regression

by Kamalika Chaudhuri, Claire Monteleoni
"... This paper addresses the important tradeoff between privacy and learnability, when designing algorithms for learning from private databases. We focus on privacy-preserving logistic regression. First we apply an idea of Dwork et al. [7] to design a privacy-preserving logistic regression algorithm. Th ..."
Abstract - Cited by 58 (2 self) - Add to MetaCart
almost as well as standard regularized logistic regression, in terms of generalization error. Experiments demonstrate improved learning performance of our method, versus the sensitivity method. Our privacy-preserving technique does not depend on the sensitivity of the function, and extends easily to a

Cryptographic Techniques for Privacy-Preserving Data Mining

by Benny Pinkas - SIGKDD Explorations , 2002
"... Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything ..."
Abstract - Cited by 92 (0 self) - Add to MetaCart
but the defined output of the function. These results were shown using generic constructions that can be applied to any function that has an ecient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining

Privacy-Preserving Queries on Encrypted Data ⋆

by Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
"... Abstract. Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods for que ..."
Abstract - Cited by 30 (1 self) - Add to MetaCart
Abstract. Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, performing queries becomes more challenging. In this paper, we study efficient and provably secure methods

Privacy-Preserving Matrix Factorization

by Valeria Nikolaenko, Marc Joye, Stratis Ioannidis, Nina Taft, Udi Weinsberg, Dan Boneh
"... Recommender systems typically require users to reveal their ratings to a recommender service, which subsequently uses them to provide relevant recommendations. Revealing ratings has been shown to make users susceptible to a broad set of inference attacks, allowing the recommender to learn private us ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
highly parallelizable, giving a linear speedup with the number of available processors. We further fully implement our system, and demonstrate that even on commodity hardware with 16 cores, our privacy-preserving implementation can factorize a matrix with 10K ratings within a few hours.

A framework for high-accuracy privacy-preserving mining

by Shipra Agrawal, Jayant R. Haritsa - In Proceedings of the 21st IEEE International Conference on Data Engineering , 2005
"... To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of individual data records have been proposed recently. In this paper, we present FRAPP, a generalized matrix-theoretic framework of random perturbation, which facilitates a systematic approac ..."
Abstract - Cited by 71 (1 self) - Add to MetaCart
approach to the design of perturbation mechanisms for privacy-preserving mining. Specifically, FRAPP is used to demonstrate that (a) the prior techniques differ only in their choices for the perturbation matrix elements, and (b) a symmetric perturbation matrix with minimal condition number can

On the privacy preserving properties of random data perturbation techniques

by Hillol Kargupta, Souptik Datta - In ICDM , 2003
"... Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large fraction of them use randomized data distortion techniques to mask the data for preserving the privacy of sensitive data ..."
Abstract - Cited by 192 (6 self) - Add to MetaCart
Privacy is becoming an increasingly important issue in many data mining applications. This has triggered the development of many privacy-preserving data mining techniques. A large fraction of them use randomized data distortion techniques to mask the data for preserving the privacy of sensitive

Privacy-preservation for gradient descent methods

by Li Wan, Shuguo Han, Vincent C. S. Lee - In SIGKDD , 2007
"... Gradient descent is a widely used paradigm for solving many optimization problems. Stochastic gradient descent performs a series of iterations to minimize a target function in order to reach a local minimum. In machine learning or data mining, this function corresponds to a decision model that is to ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
preservation or secure multiparty computation to gradient-descent-based techniques. In this paper, we propose a preliminary approach to enable privacy preservation in gradient descent methods in general and demonstrate its feasibility in specific gradient descent methods.

Communication-Efficient Privacy-Preserving Clustering

by Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright, Daryl Umano
"... Abstract. The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well as regulations, often prevent the sharing of data between multiple parties. Privacy-preserving distributed dat ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
on the size of the database. Although there have been other clustering algorithms that improve on the k-means algorithm, ours is the first for which a communication efficient cryptographic privacy-preserving protocol has been demonstrated.

Privacy-Preserving Collaborative Anomaly Detection

by Haakon Andreas Ringberg
"... Unwanted traffic is a major concern in the Internet today. Unwanted traffic includes Denial of Service attacks, worms, and spam. Identifying and mitigating unwanted traffic costs businesses many billions of USD every year. The process of identifying this traffic is called anomaly detection, and Intr ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
be prohibitively expensive for large networks, such as Tier-1 ISPs, which may have tens of thousands of links and many Gbps of traffic. In the first chapter of this thesis we present a system that leverages machine learning algorithms to detect the same type of unwanted traffic as Snort, but on summarized data
Next 10 →
Results 1 - 10 of 438
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University