DPM: Clustering Sensitive Data through Separation
Abstract
References
Index Terms
- DPM: Clustering Sensitive Data through Separation
Recommendations
Differential Privacy Protection Algorithm for Data Clustering Center
Machine Learning for Cyber SecurityAbstractWith the rapid development of the information era, data mining is widely used in various fields as a technique that can discover the interrelationship between data, but it also inevitably brings some privacy leakage problems. Differential privacy ...
Achieving anonymity via clustering
Publishing data for analysis from a table containing personal records, while maintaining individual privacy, is a problem of increasing importance today. The traditional approach of deidentifying records is to remove identifying fields such as social ...
A High-Availability K-modes Clustering Method Based on Differential Privacy
Algorithms and Architectures for Parallel ProcessingAbstractIn categorical data mining, the K-modes algorithm is a classic algorithm that has been widely used. However, the data analyzed by the K-modes algorithm usually contains sensitive user information. If these data are leaked, it will seriously ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Bo Luo,
- Xiaojing Liao,
- Jun Xu,
- Program Chairs:
- Engin Kirda,
- David Lie
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Badges
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 60Total Downloads
- Downloads (Last 12 months)60
- Downloads (Last 6 weeks)60
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in