Jim Dowd

Learn More
Privacy-preserving decision tree mining is an important problem that has yet to be thoroughly understood. In fact, the privacy-preserving decision tree mining method explored in the pioneer paper [1] was recently showed to be completely broken, because its data perturbation technique is fundamentally flawed [2]. However, since the general framework(More)
  • Jim Dowd, Mp, Carol Monaghan, Graham Stringer, Mp Labour, Blackley +5 others
  • 2016
The Science and Technology Committee is appointed by the House of Commons to examine the expenditure, administration and policy of the Government Office for Science and associated public bodies. The following member was also a member of the Committee during the inquiry: Powers The committee is one of the departmental select committees, the powers of which(More)
helped me gain access to the research site and supported my data collection efforts. Jim Cutler supplied his voice for the audio recordings used in the experiment. The usual disclaimer applies. Abstract: This article examines how organizational actors mobilize social resources when they face uncertain situations of threat or opportunity. Although people(More)
Privacy-preserving data mining has become an important topic, and many methods have been proposed for a diverse set of privacy-preserving data mining tasks. However, privacy-preserving decision tree mining pioneered by [1] still remains to be elusive. Indeed, the work of [1] was recently showed to be awed [2], meaning that an adversary can actually recover(More)
  • 1