Tools for privacy preserving kernel methods in data mining

被引:0
作者
Wan, HP [1 ]
He, HC [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Intelligent Sci Res Ctr, Beijing, Peoples R China
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS | 2006年
关键词
privacy preserving; data mining; kernel methods;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We provide an overview of the emerging issues in privacy preserving data mining. Also we develop solutions for two secure two-party computing problems. Many of the research issues focus on underlying blocks, we show how to integrate them with kernel methods in classifications. We evaluate their performance, privacy capacity, and draw some initial conclusions.
引用
收藏
页码:388 / +
页数:3
相关论文
共 16 条
[1]  
[Anonymous], 1981, TR81 AIK COMP LAB
[2]  
[Anonymous], 2003, PROC 9 ACM SIGKDD IN
[3]  
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[4]  
ATALLAH MJ, 2001, P 7 INT WORKSH ALG D, V2125, P165
[5]  
Clifton C., 2002, SIGKDD EXPLOR NEWSLE, V4, P28, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[6]  
Davidson A. C., 1997, BOOTSTRAP METHODS TH
[7]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647
[8]  
EVFIMIEVSKI A, 2002, SIGKDD EXPLORATIONS, V4, P28
[9]  
GOLDBERG M, 1997, PROG HISTOCHEM CYTOC, V31, P1
[10]  
IOANNIDIS I, 2002, INT C PAR PROC, V16, P18