Corpus ID: 15857279

Privacy-Preserving Classification and Clustering Using Secure Multi-Party Computation

@inproceedings{Samet2008PrivacyPreservingCA,
  title={Privacy-Preserving Classification and Clustering Using Secure Multi-Party Computation},
  author={S. Samet and A. Miri},
  year={2008}
}
  • S. Samet, A. Miri
  • Published 2008
  • Nowadays, data mining and machine learning techniques are widely used in electronic applications in different areas such as e-government, e-health, e-business, and so on. One major and very crucial issue in these type of systems, which are normally distributed among two or more parties and are dealing with sensitive data, is preserving the privacy of individual’s sensitive information. Each party wants to keep its own raw data private while getting useful knowledge from the whole data owned by… CONTINUE READING
    2 Citations
    Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
    • S. Samet, A. Miri
    • Computer Science
    • 2009 International Conference on Computational Science and Engineering
    • 2009
    • 18

    References

    SHOWING 1-10 OF 32 REFERENCES
    Privacy Preserving Clustering
    • 176
    • PDF
    Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
    • 393
    • Highly Influential
    • PDF
    Privacy Preserving Decision Tree in Multi Party Environment
    • 11
    Privacy Preserving Clustering by Data Transformation
    • 271
    • PDF
    Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data
    • M. Xiao, K. Han, L. Huang, J. Li
    • Computer Science
    • Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05)
    • 2005
    • 54
    Cryptographic techniques for privacy-preserving data mining
    • 443
    • PDF
    Privacy-preserving data mining
    • 1,037
    • PDF
    Privacy-preserving k-means clustering over vertically partitioned data
    • 724
    • Highly Influential
    • PDF
    A New Privacy-Preserving Distributed k-Clustering Algorithm
    • 108
    • PDF
    Secure set intersection cardinality with application to association rule mining
    • 220
    • PDF