Privacy-sensitive Bayesian network parameter learning

@article{Meng2004PrivacysensitiveBN,
  title={Privacy-sensitive Bayesian network parameter learning},
  author={Da Meng and K. Sivakumar and H. Kargupta},
  journal={Fourth IEEE International Conference on Data Mining (ICDM'04)},
  year={2004},
  pages={487-490}
}
  • Da Meng, K. Sivakumar, H. Kargupta
  • Published 2004
  • Computer Science
  • Fourth IEEE International Conference on Data Mining (ICDM'04)
  • This paper considers the problem of learning the parameters of a Bayesian network, assuming the structure of the network is given, from a privacy-sensitive dataset that is distributed between multiple parties. For a binary-valued dataset, we show that the count information required to estimate the conditional probabilities in a Bayesian network can be obtained as a solution to a set of linear equations involving some inner product between the relevant different feature vectors. We consider a… CONTINUE READING

    Figures, Tables, and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Deriving private information from randomized data
    • 460
    • PDF
    Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
    • 18
    Privacy-preserving Bayesian network parameter learning
    • 11
    • PDF
    Privacy in a Networked World
    • 22
    • PDF

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 15 REFERENCES
    How to generate and exchange secrets
    • 2,036
    • PDF
    Privacy-preserving data mining
    • 1,199
    Tools for privacy preserving distributed data mining
    • 938
    • PDF
    Privacy Preserving Data Mining
    • 848
    • PDF
    Limiting privacy breaches in privacy preserving data mining
    • 774
    • PDF
    On the privacy preserving properties of random data perturbation techniques
    • 697
    • PDF
    Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • 222
    Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification
    • 309
    • PDF
    Secure Multiparty Computation of Approximations
    • 113
    • Highly Influential
    The end of privacy
    • 96