Download Vassilios S

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
ΕΠΙΣΤΗΜΟΝΙΚΕΣ ΔΗΜΟΣΙΕΥΣΕΙΣ
ΜΕΤΑΦΡΑΣΗ ΒΙΒΛΙΟΥ
1. M.H. Dunham, Data Mining Introductory and Advanced Topics. Prentice Hall (Μετάφραση
από Β. Βερύκιο και Γ. Θεοδωρίδη – Εκδόσεις Νέες Τεχνολογίες)
ΚΕΦΑΛΑΙΑ ΣΕ ΒΙΒΛΙΑ
1. Verykios, V.S., and Elmagarmid, A.K., The Purdue University Data Quality Project. In R.
Wang, M. Ziad and Y. Lee, Eds., Data Quality, Chapter 8, pp. 119-137, Kluwer Academic
Publishers, 2001.
2. Houstis, E.N., Verykios, V.S., Catlin, A.C., Ramakrishnan, N., and Rice, J. R. A Data
Mining Environment for Modeling the Performance of Scientific Software. In E.N. Houstis,
S. Gallopoulos, J.R. Rice and R. Bramley, Eds., Enabling Technologies for Computational
Science: Frameworks, Middleware and Environments, Chapter 21, pp. 261-271, Kluwer
Academic Publishers, 2000.
ΔΗΜΟΣΙΕΥΣΕΙΣ ΣΕ ΠΕΡΙΟΔΙΚΑ
1.
Verykios, V.S., Elmagarmid, A.K., Bertino, E., Dasseni, E., and Saygin, Y., Association
Rule Hiding. IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 4, pp.
434-447, April 2004.
Citations
1.
2.
3.
4.
5.
C. Aggarwal, J. Pei, and B. Zhang. On Privacy Preservation against Adversarial Data Mining. In
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
(KDD'06), Philadelphia, PA, USA, August 20-23, 2006 view
Anbumani, K., Nedunchezhian, R. Rapid Privacy Preserving Algorithm for Large Databases. International
Journal of Intelligent Information Technologies, Vol. 2, Issue 1, 2006
Chen, X., Orlowska, M. and Li X. A New Framework for Privacy Preserving Data Sharing. In Proceedings
of IEEE 4th International Conference on Data Mining ICDM04 Workshop: Privacy and Security Aspects of Data
Mining, Brighton, UK, (2004) view
Laks V. S. Lakshmanan, Raymond T. Ng, Ganesh Ramesh. To Do or Not To Do: The Dilemma of
Disclosing Anonymized Data. 61-72. SIGMOD 2005 view
Xiao-Bai Li and Sarkar, S. A Tree-Based Data Perturbation Approach for Privacy-Preserving Data
Mining. IEEE Transactions on Knowledge and Data Engineering, Vol. 18, Issue. 9, pp. 1278- 1283,
September 2006 view
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for
Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering,
January 2006 (Vol. 18, No. 1) pp. 92-106 view
S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing
Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view
Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis,
Department of Computer Science, University of Helsinki, May 2005 view
Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004:
219-229 view
Juggapong Natwichai, Xue Li, Maria E. Orlowska. Hiding Classification Rules for Data Sharing with
Privacy Preservation. DaWaK 2005, pp. 468-477 view
Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules
Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view
Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc.
of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30,
2005 view
En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in
Association Rules Mining. COMPSAC (1) 2005 : 511-516 view
K. Wang, B. C. M. Fung, and P. S. Yu. Template-Based Privacy Preservation in Classification Problems.
In Proc. of the 5th IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November
27-30, 2005 view
K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping Attacker's Confidence: An Alternative to kAnonymization. Invited paper, to appear in Knowledge and Information Systems: An International Journal,
2006, Springer-Verlag view
Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules.
2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA,
August 15-17, 2005
R. Wong, J. Li, A. Fu, K. Wang. (alpha,k)-Anonymity: An Enhanced k-Anonymity Model for PrivacyPreserving Data Publishing. Proceedings of the twelfth ACM SIGKDD international conference on
knowledge discovery and data mining (KDD), 2006 view
2. Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., and Theodoridis, Y.,
State of the Art in Privacy Preserving Data Mining. SIGMOD Record, vol. 33, no. 1, pp. 5057, March 2004.
Citations
18.
19.
20.
21.
22.
23.
24.
25.
26.
N. Anciaux, H.J.W. van Heerde, L. Feng, P.M.G. Apers. Implanting Life-Cycle Privacy Policies in a Context
Database. CTIT Technical reports, ISSN 1381-3625, University of Twente, 2006 view
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti, Dino Pedreschi. k-Anonymous Patterns. PKDD 2005:
10-21 view
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. k-Anonymous Patterns. 2005-TR17 (technical report) 2005-05-11 view
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern
Discovery. Technical Report. May 2006 view
George Binto, Anna Valeva. A Database Security Course on a Shoestring. SIGCSE 2006 Technical
Symposium on Computer Science Education, Houston, Texas USA March 1-5, 2006 view
Justin Brickell, Vitaly Shmatikov. Privacy-Preserving Graph Algorithms in the Semi-Honest Model. In Proc.
of Advances in Cryptology - ASIACRYPT 2005, Chennai (Madras), India, December 2005, vol. 3788 of Lecture
Notes in Computer Science, pp. 236-252. Springer, 2005 view
R. Chen, C. Giannella, K. Sivakumar, and H. Kargupta. Distributed Data Mining for Earth and Space
Science Applications. In Proceedings of the NASA Earth Science Technology Conference, 2004 view
Chen, X., Orlowska, M. and Li X. A New Framework for Privacy Preserving Data Sharing. In Proceedings
of IEEE 4th International Conference on Data Mining ICDM04 Workshop: Privacy and Security Aspects of Data
Mining, Brighton, UK, (2004) view
Chitti, L. Xiong, L. Liu. Mining Multiple Private Databases using a Privacy Preserving kNN Classifier.
Available as technical report, College of Computing, Georgia Institute of Technology, 2004 view
2
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
Sebastien Gambs. Balazs Kegl. Esma Aımeur. Privacy-Preserving Boosting. In proc. Data Mining and
Knowledge Discovery, April 2005 view
Peter Christen. Privacy-Preserving Data Linkage and Geocoding: Current Approaches and Research
Directions. In Workshop on Privacy Aspects of Data Mining held at the ICDM: IEEE International Conference
on Data Mining , Hong Kong, December 2006 view
A. Friedman, R. Wolff, and A. Schuster. Providing k-Anonymity in Data Mining. Accepted for Journal of
VLDB, 2006 view
D. Frankowski, D. Cosley, S. Sen, L. Terveen, J, Riedl. You are what you say: privacy risks of public
mentions. Proceedings of the 29th annual international ACM SIGIR conference on research and development
in information retrieval, 2006 view
J. Han and M. Kamber. Data Mining: Concepts and Techniques. 2nd edition, Elsevier Inc. 2006 view
S. K. Lam, D. Frankowski, J. Riedl. Do You Trust Your Recommendations? An Exploration Of Security
and Privacy Issues in Recommender Systems. In Proceedings of the 2006 International Conference on
Emerging Trends in Information and Communication Security (ETRICS), Freiburg, Germany, 2006 view
Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for
Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering,
January 2006 (Vol. 18, No. 1) pp. 92-106 view
S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing
Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view
Alain Mille. Traces Based Reasoning (TBR) Definition, illustration and echoes with story telling. Rapport
de recherche RR-LIRIS-2006-002, 2006 view
Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis,
Department of Computer Science, University of Helsinki, May 2005 view
Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004:
219-229 view
Mungamuru, B. and Garcia-Molina, H. Beyond Just Data Privacy. InfoLab technical report. Stanford
University, July 2006 view
Mungamuru, B., Garcia-Molina, H., and Mitra, S. How to Safeguard Your Sensitive Data. InfoLab technical
report. Stanford University, April 2006 view
Mungamuru, B., Garcia-Molina, H. and Olston, C. Configurations: Understanding Alternatives For
Safeguarding Data. InfoLab technical report. Stanford University, July 2006 view
Juggapong Natwichai, Xue Li, Maria E. Orlowska. Hiding Classification Rules for Data Sharing with
Privacy Preservation. DaWaK 2005, pp. 468-477 view
Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules
Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view
Matthew Roughan and Yin Zhang. Secure distributed data-mining and its application to large-scale
network measurements. ACM SIGCOMM Computer Communication, Volume 36 , Issue 1, pp 7-14, January
2006 view
Matthew Roughan and Yin Zhang. Privacy-Preserving Performance Measurements. In Proceedings of ACM
SIGCOMM Workshop on Mining Network Data (MineNet 2006), Pisa, Italy, September 2006 view
Vidar Evenrud Seeberg. Filtering real data for IDS benchmarking. MSc Project Plan at Gjøvik University
College (Høgskolen i Gjøvik), Norway, December 2005 view
J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents.
Engineering Applications of Artificial Intelligence, 2005 view
Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc.
of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30,
2005 view
Tuovinen L., Roning J. Balance of power: the social-ethical aspect of data mining. In Proc of Sixth
International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005), July 17-19, Enschede, the
Netherlands view
Jinlong Wang, Congfu Xu, Huifeng Shen, Zhaohui Wu, Yunhe Pan. DHAI: Dynamic Hierarchical AgentBased Infrastructure for Supporting Large-Scale Distributed Information Processing . ICCNMC 2005:
873-882
Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules.
2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA,
August 15-17, 2005
Jinlong Wang, Congfu Xu, Huifeng Shen, Yunhe Pan. Hierarchical Infrastructure for Large-Scale
Distributed Privacy-Preserving Data Mining. International Conference on Computational Science (3) 2005:
1020-1023
3
52.
53.
54.
55.
56.
57.
58.
Chai Wah Wu. Privacy preserving data mining with unidirectional interaction. ISCAS 2005 - IEEE
International Symposium on Circuits and Systems. IEEE, December 2004 view
Ming-Jun Xiao, Liu-Sheng Huang, Yong-Long Luo, Hong Shen. Privacy Preserving ID3 Algorithm over
Horizontally Partitioned Data. PDCAT 2005: 239-243
Li Xiong, Subramanyam Chitti, Ling Liu. Top Queries across Multiple Private Databases. In Proc of 25th
IEEE International Conference on Distributed Computing Systems (ICDCS'05) pp. 145-154 view
Shuting Xu, Jun Zhang, Dianwei Han, Jie Wang. Data Distortion for Privacy Protection in a Terrorist
Analysis System. ISI 2005: 459-464, Atlanta, Georgia, USA
H. Yu, J. Vaidya & X. Jiang. Privacy-Preserving SVM Classification on Vertically Partitioned Data. Lecture
Notes in Computer Science - Pacific-Asia Conf. on Knowledge Discovery and Data Mining, Springer, 2006
view
Peng Zhang , Yunhai Tong , Shiwei Tang, Dongqing Yang. Privacy Preserving Naive Bayes Classification.
ADMA 2005 : 744-752
Nan Zhang and Wei Zhao. On the Privacy Protection in Information Sharing. tamu-cs-tr-2004-121(technical report) view
3. Verykios, V.S., Moustakides, G.V., and Elfeky, M.G., A Bayesian Decision Model for Cost
Optimal Record Matching. The VLDB Journal, vol. 12, no. 1, pp. 28-40, May 2003.
Citations
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
Aizawa,Akiko, Oyama,Keizo, Takasu,Atsuhiro, Adachi,Jun. Record Linkage of Multi-source Databases:
Research Trends. NII Journal, No.8, pp. 43-51, 2004 view
Rohan Baxter, Peter Christen and Tim Churches. A Comparison of Fast Blocking Methods for Record
Linkage. Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington DC, August
2003 view
Benjelloun, Omar; Garcia-Molina, Hector; Kawai, Hideki; Larson, Tait; Menestrina, David; Thavisomboon,
Sutthipong. D-Swoosh: A Family of Algorithms for Generic, Distributed Entity Resolution. technical
report, March 2006 view
L. Gu, R. Baxter, D. Vickers, and C. Rainsford. Record linkage: Current practice and future directions.
Technical Report 03/83, CSIRO Mathematical and Information Sciences, Canberra, Australia, April 2003 view
L. Berti-Iquille. Cost of Low-Quality Data Over Association Rules Discovery. International Symposium on
Applied Stochastic Models and Data Analysis (AMSDA 2005), Brest, France, May 2005 view
Mikhail Bilenko, Sugato Basu, and Mehran Sahami. Adaptive Product Normalization: Using Online
Learning for Record Linkage in Comparison Shopping. In Proc. of the 5th International Conference on
Data Mining (ICDM-2005), November 2005 view
Zhaoqi Chen, Dmitri V. Kalashnikov and Sharad Mehrotra. Exploiting relationships for object
consolidation. In ACM IQIS, June 13-17, 2005 view
Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed K. Elmagarmid,
Dan Suciu. Privacy-preserving data integration and sharing. DMKD 2004: 19-26 view
Dmitri Kalashnikov and Sharad Mehrotra. A probabilistic model for entity disambiguation using
relationships. Technical Report, TR-RESCUE-04-12, Jun 1, 2004 view
Dmitri Kalashnikov and Sharad Mehrotra. Learning importance of relationships for reference
disambiguation. Technical Report, 2004-12 view
Dmitri V. Kalashnikov and Sharad Mehrotra. Domain-independent data cleaning via analysis of entityrelationship graph. In ACM Transactions on Database Systems (ACM TODS), June 2006 view
Dmitri V. Kalashnikov, Zhaoqi Chen, and Sharad Mehrotra. RelDC: domain-independent data cleaning
utilizing relationships. TR-RESCUE-04-20, Sep 22, 2004 view
Dmitri V. Kalashnikov, Sharad Mehrotra, Zhaoqi Chen. Exploiting Relationships for Domain-Independent
Data Cleaning. SDM 2005 view
DV. Kalashnikov, S. Mehrotra, and S.Chen. Exploiting Relationships for Data Cleaning. UCI-ICS-TR-0411, May 19, 2004 view
Malik, Choudhry Muhammad Zaki. Enforcing Trade Secrets among Competitors on the Semantic Web.
Master's Thesis, 2004-08-18 view
David Menestrina, Omar Benjelloun, Hector Garcia-Molina. Generic Entity Resolution with Data
Confidences. CleanDB 2006 view
Diego Milano, Monica Scannapieco, Tiziana Catarci. Structure Aware XML Object Identification. CleanDB
2006 view
4
4.
Missier, P., Lalk, G., Verykios, V.S., Grillo, F., Lorusso, T., and Angeletti, P. Improving
Data Quality in Practice: A Case Study in the Italian Public Administration. Distributed and
Parallel Databases Journal, vol. 13, issue 2, pp. 135-160, March 2003.
Citations
76.
77.
5.
Elisa Bertino and Ravi Sandhu. Database Security-Concepts, Approaches, and Challenges. IEEE Trans.
Dependable Sec. Comput. 2(1): 2-19, 2005 view
Leif Skiftenes Flak , Stig Nordheim. Stakeholders, Contradictions and Salience: An Empirical Study of a
Norwegian G2G Effort. In Proceedings of 39th Hawaii International International Conference on Systems
Science (HICSS), 2006 view
Houstis, E.N., Rice, J.R., Catlin, A.C., Dhanjani, N., Ramakrishnan, N., Verykios, V.S.
MyPYTHIA: A Recommendation Portal for Scientific Software and Services. Concurrency
and Computation: Practice and Experience, vol. 14, issue 13-15, pp. 1481-1505,
November-December 2002.
Citations
78.
79.
80.
81.
6.
Michael S. Crocker, Scott S. Hampton, Thierry Matthey, Jesús A. Izaguirre. MDS IM Aid: Automatic
parameter optimization in fast electrostatic algorithm. Journal of Computational Chemistry, Volume 26,
Issue 10 , Pages 1021 - 1031, May 2005 view
G. Fox, D. Gannon, and M. Thomas. Editorial: A Summary of Grid Computing Environments,
Concurrency and Computation: Practice and Experience. Vol. 14, No. 13-15, pp. 1035-1044 (2002) view
Fox, G., Pierce, M., Gannon, D., Thomas, M. Overview of Grid Computing Environments. Technical Report
GGF-GCE-OVERVIEW2, GGF (2003) view
Sibylle Schupp, Marcin Zalewski, Kyle Ross. Rapid performance prediction for library components. WOSP
2004: 69-73 view
Saygin, Y., Verykios, V.S., Clifton, C.W. Using Unknowns to Prevent Discovery of
Association Rules. SIGMOD Record, vol. 30, no. 4, pp. 45-54, December 2001.
Citations
82.
83.
84.
85.
86.
87.
88.
89.
Shipra Agrawal. High Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004
view
Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE
2005: 193-204 view
Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern
Discovery. Technical Report. May 2006 view
Liwu Chang, Ira S. Moskowitz. A Study of Inference Problems in Distributed Databases. DBSec 2002: 191204 view
Liwu Chang and James Tracy. Multi-Dimensional Inference and Confidential Data Protection with
Decision Tree Methods. ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Dec,
2002, Maebashi, Japan, pp 195-200 view
T. Johnsten, R. Sweeney, V. Raghavan. A Methodology for Hiding Knowledge in XML Document
Collections. In Proceedings of COMPSAC-2003 Workshop on Web & Security Informatics, Dallas, TX, Nov
2003 view
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen. Hiding Sensitive Patterns in Association Rules Mining.
COMPSAC 2004: 424-429 view
5
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
7.
Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for
Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering,
January 2006 (Vol. 18, No. 1) pp. 92-106 view
S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing
Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view
Taneli Mielikainen. Summarization Techniques for Pattern Collections in Data Mining. PhD Thesis,
Department of Computer Science, University of Helsinki, May 2005 view
Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004:
219-229 view
Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules
Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view
E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE
Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view
T. Johnsten, V. Raghavan. A Methodology for Hiding Knowledge in Databases. In Proceedings of ICDM02
Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, 2002 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM
2003: 613-616 view
S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE
ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in
Association Rule Mining. IDEAS 2003: 54-65 view
Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent
Patterns. TR02-13, Jun 2002 (technical report) view
Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in
Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data
Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton,
C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view
Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The
Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003, (technical report) view
Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules
in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287,
Volume 1 - Issue 3, 2006 view
Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693
view
J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents.
Engineering Applications of Artificial Intelligence, 2005 view
Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer
Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view
Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc.
of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30,
2005 view
Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules.
2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA,
August 15-17, 2005
Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari. Hiding sensitive items in privacy preserving
association rule mining. SMC (4) 2004: 3239-3244
Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and
Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view
Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A
Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach,
California, USA html
Verykios, V.S., Houstis, E.N., Tsoukala, L.H., and Pantazopoulos, K.N. Automating the
Analysis of Option Pricing Algorithms through Intelligent Knowledge Acquisition
Approaches. IEEE Transactions on Systems, Man and Cybernetics. Part A, vol. 31, issue
6, pp. 573-586, November 2001.
6
Citations
112. Nurminen, Jukka K. Modelling and Implementation Issues in Circuit and Network Planning Tools. Master
thesis, 2003 view
8. Verykios, V.S., Elmagarmid, A.K., and Houstis, E.N. Automating the Approximate Record
Matching Process. Journal of Information Sciences, vol. 126, issue 1-4, pp. 83-98, July
2000.
Citations
113. Akiko Aizawa , Keizo Oyama. A Fast Linkage Detection Scheme for Multi-Source Information Integration.
WIRI 2005 : 30-39 view
114. Christen, Peter and Churches, Tim (2002). Febrl - Freely extensible biomedical record linkage. Technical
115.
116.
117.
118.
119.
120.
Report Computer Science Technical Reports no.TR-CS-02-05, Department of Computer Science, FEIT, ANU
view
Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and
Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view
Peter Christen, Justin Xi Zhu, Markus Hegland, Stephen Roberts, Ole M. Nielsen, Tim Churches and Kim Lim.
High-Performance Computing Techniques for Record Linkage. In Proceedings of the Australian Health
Outcomes Conference (AHOC-2002), Canberra, July 2002 view
Martin Doerr, Manos Papagelis. A method for estimating the precision of place name matching.
International journal of Digital Libraries, 2004 view
Ruggles, S. Linking Historical Censuses: A New Approach. Presented at the International Microdata
Access Group, Montreal, Novermber 10-11, 2003 view
G.A. Wang , J. Xu, H. Chen. Using Social Contextual Information to Match Criminal Identities. In
Proceedings of Hawaii International Conference on System Sciences (HICSS-39), Kauai, HI, USA, January 47, 2006 view
Huimin Zhao, Sudha Ram. Entity identification for heterogeneous database integration--a multiple
classifier system approach and empirical evaluation . Inf. Syst. 30(2): 119-132 (2005) view
9. Verykios, V.S., Houstis, E.N. and Rice, J.R. A Knowledge Discovery Methodology for the
Performance Evaluation of Scientific Software. Journal of Neural, Parallel & Scientific
Computations, vol. 8, no. 2, pp. 115-132, June 2000.
10. Houstis, E.N., Catlin, A.C., Rice, J.R., Verykios, V.S., Ramakrishnan, N., and Houstis, C.E.
PYTHIA-II: A Knowledge/Database System for Managing Performance Data and
Recommending Scientific Software. ACM Transactions on Mathematical Software, vol. 26,
no. 2, pp. 227-253, June 2000.
Citations
121. Aktas, M., M. Pierce, G. Fox, and D. Leake. A Web based Conversational Case-Based Recommender
System for Ontology Aided Metadata Discovery. November 8, Proceedings of the 5th IEEE/ACM
International Workshop on Grid Computing (GRID 2004), 2004 view
122. Bettig, B., Sandu, C., Joshi, A., and Birru, K.. Dynamic Solver Selection for an Internet Simulation
Backbone. Proceedings of the 2003 ACM Symposium on Applied Computing, Melbourne, Florida, March 913, 2003 view
123. P. Bora, C. J. Ribbens, S. Prabhakar, G. Swaminathan, M. Chinnusamy, A. Jeyakumar and B. Diaz-Acosta.
Issues in Runtime Algorithm Selection for Grid Environments. in Proceedings of the International
Workshop on Challenges of Large Applications in Distributed Environments, I. Banicescu (ed.), IEEE Press,
Los Alamitos, CA, 2003, pp 80-87 view
7
124. Michael S. Crocker, Scott S. Hampton, Thierry Matthey, Jesús A. Izaguirre. MDS IM Aid: Automatic
125.
126.
127.
128.
129.
130.
131.
132.
133.
134.
135.
136.
137.
parameter optimization in fast electrostatic algorithm. Journal of Computational Chemistry, Volume 26,
Issue 10 , Pages 1021 - 1031, May 2005 view
H. Guo. A Bayesian Approach for Automatic Algorithm Selection. IJCAI03 Workshop on AI and Autonomic
Computing: Developing a Research Agenda for Self-Managing Computer Systems, 2003 view
H. Guo and W. Hsu. A Machine Learning Approach to Algorithm Selection for NP-hard Optimization
Problems. Submitted to Annals of Operations Research, Special Issue on "Stochastic Search Algorithms",
2005 view
Farthing, M.W., D.R. Sassen, J.F. Prins, and C.T. Miller (2004). A problem solving environment for
subsurface flow and transport phenomena. XV International Conference on Computational Methods in
Water Resources, Chapel Hill, NC, 13-17 June 2004, In press: Volume 2, Edited by: C.T. Miller, M.W. Farthing,
W.G. Gray, and G.F. Pinder, Elsevier Science, Amsterdam, The Netherlands view
Karen L. Karavanic, John May, Kathryn Mohror, Brian Miller, Kevin Huck, Rashawn Knapp, Brian Pugh.
Integrating Database Technology with Comparison-based Parallel Performance Diagnosis: The
PerfTrack Performance Experiment Management Tool. The SC 2005 Conference, IEEE/ACM, Seattle, Nov.
2005 view
Shu Jiang. An Experiment Management Component for the WBCSim Problem Solving Environment.
Master's Thesis, 2002-12-13
J. G. Michopoulos, C. Farhat and J. Fish. Survey on Modeling and Simulation of Multiphysics Systems.
Journal of Computing and Information Science in Engineering, Volume 5, Issue 3, pp. 198-213 (2005) view
R. J. Mooney, P. Melville, L. R. Tang, J. Shavlik, I. C. Dutra, D. Page, V. S. Costa. Relational Data Mining
with Inductive Logic Programming for Link Discovery. In Hillol Kargupta, Anupam Joshi, K. Sivakumar,
Yelena Yesha, editors, Data Mining: Next Generation Challenges and Future Directions. AAAI/MIT Press,
2003 view
Nurminen, Jukka K. Modelling and Implementation Issues in Circuit and Network Planning Tools. Master
thesis, 2003 view
Y. S. Ong, 2002, Thesis: Artificial Intelligence Technologies in Complex Engineering Design view
C. J. Ribbens, D. Kafura, A. Karnik and M. Lorch. The Virginia Tech Computational Grid: A Research
Agenda. Virginia Tech Department of Computer Science Report TR-02-31, 2002 view
R. Vuduc, J.W. Demmel, J. Bilmes. Statistical models for empirical search-based performance tuning.
International Journal of High-Performance Computing Applications, 18 (1), pp. 65-94, February 2004 view
Wallin, Dan. Methods for Creating and Exploiting Data Locality. Doctoral thesis. Uppsala University,
Teknisk-naturvetenskapliga vetenskapsområdet, Mathematics and Computer Science, Department of
Information Technology. April 2006 view
Wilson, David C., Leake, David B., and Bramley, Randall. (2000). Case-Based Recommender Components
for Scientific Problem-Solving Environments. Proceedings of the Sixteenth International Association for
Mathematics and Computers in Simulation World Congress view
ΔΗΜΟΣΙΕΥΣΕΙΣ ΣΕ ΔΙΕΘΝΗ ΣΥΝΕΔΡΙΑ και ΗΜΕΡΙΔΕΣ
1.
Pontikakis E.D., Tsitsonis, A. Verykios, V.S. An Experimental Study of Distortion-based
Techniques for Association Rule Hiding. To appear in IFIP WG 11.3 Working Conference
on Data and Applications Security, July 2004, Sitges, Spain.
Citations
138. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical
Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180
(2005) view
139. Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules
in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287,
Volume 1 - Issue 3, 2006 view
8
2.
Pontikakis E.D., Verykios, V.S., Theodoridis Y. On the Comparison of Association Rule
Hiding Heuristics. In the Proceedings of 3rd Hellenic Data Management Symposium, HDMS
2004, June 2004, Athens, Hellas.
Citations
140. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical
Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180
(2005) view
3.
Verykios, V.S., Moustakides, G.V. A Generalized Cost Optimal Model for Record
Matching. In Proceedings of IQIS 2004, International Workshop of Information Quality in
Information Systems (SIGMOD 2004 Workshop) , June 2004, Paris, France.
4.
Pontikakis E.D., Verykios, V.S. An Experimental Study of Association Rule Hiding
Techniques, DIMACS/PORTIA Workshop in Privacy Preserving Data Mining, March 2004,
Rutgers University, New Jersey, USA.
Citations
141. Stephen E. Fienberg, Aleksandra B. Slavkovic. Preserving the Confidentiality of Categorical Statistical
Data Bases When Releasing Information for Association Rules. Data Min. Knowl. Discov. 11 (2): 155-180
(2005) view
5.
Pfoser, D., Tryfona, N., Verykios, V.S. Service-Based Data Management in a Global
Computing Environment. In Proceedings of the 3rd International Workshop on Web and
Wireless Geographical Information Systems (W2GIS) December 13, 2003, Rome, Italy.
Citations
142. Chara Skouteli, Christoforos Panayiotou, George Samaras, Evaggelia Pitoura. Communities: ConceptBased Querying for Mobile Services. Global Computing 2004: 59-76 view
6. Elfeky, M.G., Verykios, V.S. On Search Enhancement of the Record Linkage Process. In
Proceedings of the KDD 2003 Workshop on Data Cleaning, Record Linkage and Object
Consolidation, August 2003, Washington, DC, USA.
Citations
143. Zhaoqi Chen, Dmitri V. Kalashnikov and Sharad Mehrotra. Exploiting relationships for object
consolidation. In ACM IQIS, June 13-17, 2005 view
7. Houstis, E.N., Verykios, V.S., Catlin, A.C., Rice, J.R. A Knowledge Discovery Methodology
for Behavior Analysis of Large-Scale Applications on Parallel Architectures. In Proceedings
of International Conference on Computational Science, pp. 739-748, June 2003,
Melbourne, Australia.
9
8. Saygin, Y., Verykios, V.S., Elmagarmid, A.K. Privacy Preserving Association Rule Mining.
In Proceedings of 12th International Workshop on Research Issues in Data Engineering
(RIDE 2002), pp. 151-158, San Jose, CA, USA.
Citations
144. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004
view
145. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE
2005: 193-204 view
146. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view
147. Seunghyun Im , Zbigniew W. Ras. Ensuring Data Security Against Knowledge Discovery in Distributed
Information Systems. RSFDGrC (2) 2005 : 548-557
148. E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE
Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view
149. Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693
view
150. J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents.
Engineering Applications of Artificial Intelligence, 2005 view
151. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer
Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view
152. Slavkovic, A.B. Statistical Disclosure Limitation with Released Marginal and Conditionals for
Contingency Tables. Proceedings of Workshop on Privacy and Security Aspects of Data Mining ICDM '04,
2004 view
153. Chen Zi-Yang, Liu Guo-Hua. Quantitative Association Rules Mining Methods with Privacy-preserving.
PDCAT 2005: 910-912
9. Elfeky, M.G., Verykios, V.S., Elmagarmid, A.K. TAILOR: A Record Linkage Toolbox. In
Proceedings of 18th International Conference on Data Engineering (ICDE 2002), pp. 17-28,
San Jose, CA, USA.
Citations
154. Aizawa,Akiko, Oyama,Keizo, Takasu,Atsuhiro, Adachi,Jun. Record Linkage of Multi-source Databases:
Research Trends. NII Journal, No.8, pp. 43-51, 2004 view
155. Rohan Baxter, Peter Christen and Tim Churches. A Comparison of Fast Blocking Methods for Record
156.
157.
158.
159.
160.
161.
162.
Linkage. Workshop on Data Cleaning, Record Linkage and Object Consolidation, Washington DC, August
2003 view
L. Berti-Iquille. Cost of Low-Quality Data Over Association Rules Discovery. International Symposium on
Applied Stochastic Models and Data Analysis (AMSDA 2005), Brest, France, May 2005 view
Indrajit Bhattacharya, Lise Getoor. Iterative Record Linkage for Cleaning and Integration. 9th ACM
SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, Paris, FR, June 2004 view
Alexander Bilke, Felix Naumann. Schema Matching Using Duplicates. 21 st International Conference on
Data Engineering (ICDE'05), pp 69-80 view
Philip Bohannon, Michael Flaster, Wenfei Fan, Rajeev Rastogi. A Cost-Based Model and Effective Heuristic
for Repairing Constraints by Value Modification. SIGMOD Conference 2005: 143-154 view
Cameron, M. A. and Taylor, K. First-order patterns for information integration. In Lowe, D. and Gaedke,
M., eds. Web Engineering: 5th International Conference (ICWE 2005); Sydney, NSW. Springer; 2005: 173184
Cameron, M., Taylor, K. and Baxter, R. (2004). Web service composition and record linking. VLDB
Workshop on Information Integration on the Web, IIWeb 2004, Toronto, Canada
Peter Christen. Privacy-Preserving Data Linkage and Geocoding: Current Approaches and Research
Directions. In Workshop on Privacy Aspects of Data Mining held at the ICDM: IEEE International Conference
on Data Mining , Hong Kong, December 2006 view
10
163. Peter Christen. Probabilistic Data Generation for Deduplication and Data Linkage. In Proceedings of the
164.
165.
166.
167.
168.
169.
170.
171.
172.
173.
174.
175.
176.
177.
178.
179.
180.
181.
182.
183.
184.
185.
186.
187.
the Sixth International Conference on Intelligent Data Engineering and Automated Learning (IDEAL'05),
Brisbane, July 2005 view
Peter Christen and Tim Churches. A Probabilistic Deduplication, Record Linkage and Geocoding System.
In Proceedings of the ARC Health Data Mining workshop, University of South Australia, April 2005 view
Peter Christen, Tim Churches , Markus Hegland. A Parallel Open Source Data Linkage System. In the Proc
of The Eighth Pacific-Asia Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004
view
Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and
Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view
Peter Christen and Karl Goiser. Towards Automated Data Linkage and Deduplication. Tech report,
AustralianNational University, 2005 view
Peter Christen and Karl Goiser. Quality and Complexity Measures for Data Linkage and Deduplication.
Submitted chapter for the book Quality Measures in Data Mining, July 2005 view
Peter Christen and Karl Goiser. Assessing Deduplication and Data Linkage Quality: What to Measure?.
Proceedings of the fourth Australasian Data Mining Conference (AusDM 2005), Sydney, December 2005 view
Gu,L., Baxter,R. Adaptive Filtering for Efficient Record Linkage. In the proc of 2004 SIAM Int. Conf. on
Data Mining, April 22-24, Orlando, Florida view
L. Gu, R. Baxter, D. Vickers, and C. Rainsford. Record linkage: Current practice and future directions.
Technical Report 03/83, CSIRO Mathematical and Information Sciences, Canberra, Australia, April 2003 view
Liang Jin , Chen Li , Sharad Mehrotra. Efficient Record Linkage in Large Data Sets. Proceedings of the
Eighth International Conference on Database Systems for Advanced Applications, p.137, March 26-28, 2003
view
DV. Kalashnikov, S. Mehrotra, and S.Chen. Exploiting Relationships for Data Cleaning. UCI-ICS-TR-0411, May 19, 2004 view
Li, S., Belapurkar, A., Ganiz, M., Janneck, C. J., Wu, T. and Pottenger, W. M. Mining Higher-Order
Association Rules from Distributed Named Entity Databases. In the Proceedings of the Twelfth ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining. Philadelphia, PA, August 2006.
(Submitted) view
Shenzhi Li, Christopher D. Janneck, Xiaoning Yang, Aditya Belapurkar, Osama A. Khan, Tianhao Wu, Murat
Ganiz, Mark D. Dilsizian and William M. Pottenger. Distributed Higher Order Text Mining. Lehigh University,
technical report, 2006 view
Malin, B. Betrayed by My Shadow: Learning Data Identity via Trail Matching. Journal of Privacy
Technology. 2005 view
Brandley Malin. Trail Re-identification and Unlinkability in Distributed Databases. CMU-ISRI-06-10,
Institute for Software Research, International School of Computer Science, Carnegie Mellon University, May
2006 view
Martin, T.P. and Y. Shen. Improving access to multimedia using multi-source hierarchical meta-data.
AMR 2005 - Adaptive Multimedia Retrieval 2005, Springer view
Matthew Michelson and Craig A. Knoblock. Learning Blocking Schemes for Record Linkage. In
Proceedings of the 21st National Conference on Artificial Intelligence (AAAI-06), Boston, MA, 2006 view
P Missier, S Embury, M Greenwood, A Preece & B Jin. Quality views: Capturing and Exploiting the User
Perspective on Data Quality. In Proc 32nd International Conference on Very Large Data Bases (VLDB 2006),
pages to appear, 2006 view
P Missier, A Oliaro, & S Raffa. Practical Data Quality Certification: Model, Architecture, and Experiences.
Proc 3rd International ACM SIGMOD Workshop on Information Quality in Information Systems (IQIS 2006),
2006 view
Paolo Missier, Suzanne M. Embury. Provider issues in quality-constrained data provisioning. IQIS 2005:
5-15 view
Mattis Neiling. Identification of Real-world Objects in Multiple Databases. In Proc. of GfKl Conference
2005, Magdeburg. March 9-11, 2005 view
Taylor, O'Keefe, Colton, Baxter, Sparks, Srinivasan, Cameron & Lefort. A Service Oriented Architecture for
a Health Research Data Network. In Proceedings of the 19th International Conference on Scientific and
Statistical Database Management 21-23 June 2004 Santorini Island Greece view
M. Scannapieco, P. Missier, C. Batini. Data Quality at a Glance. Datenbank-Spektrum 14, August 2005
Widom, J. Trio: a system for integrated management of data, accuracy, and lineage. Second Biennial
Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, Calif., USA, 4-7 January 2005 view
Winkler, W. E. Data cleaning methods. In Proceedings of the KDD-2003 Workshop on Data Cleaning,
Record Linkage, and Object Consolidation (Washington, DC, 2003), pp. 1-6 view
11
10. Dasseni, E., Verykios, V.S., Elmagarmid, A.K., and Bertino, E. Hiding Association Rules by
Using Confidence and Support. In Proceedings of 4th International Hiding Workshop (IHW
2001) pp. 369-383, April 2001, Pittsburgh, PA, USA (Lecture Notes in Computer Science
2137 Springer 2001).
Citations
188. Aybar C. Acar, Amihai Motro. Why Is this User Asking so Many Questions? Explaining Sequences of
Queries. DBSec 2004: 159-176 view
189. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004
view
190. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE
2005: 193-204 view
191. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view
192. Ashrafi, M.Z., Taniar, D., and Smith, K.A. PPDAM: Privacy Preserving Distributed Association Rule Mining
193.
194.
195.
196.
197.
198.
199.
200.
201.
202.
203.
204.
205.
206.
207.
208.
209.
Algorithm. International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 49-69, Jan-Mar 2005
view
Ashrafi, M Z, Taniar, D & Smith, K.A. Reducing Communication Cost in a Privacy Preserving Distributed
Association Rule Mining. Lecture Notes in Computer Science , vol. 2973, no. 1, pp. 381-392, 2004
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern
Discovery. Technical Report. May 2006 view
S. Datta, H Kargupta, K. Sivakumar. Homeland Defense, Privacy-Sensitive Data Mining, and Random
Value Distortion. In Proceedings of the SIAM Workshop on Data Mining for Counter Terrorism and Security
(SDM'03),San Francisco, CA, May 2003 view
T. Johnsten, V. Raghavan. A Methodology for Hiding Knowledge in Databases. In Proceedings of ICDM02
Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, 2002 view
T. Johnsten, R. Sweeney, V. Raghavan. A Methodology for Hiding Knowledge in XML Document
Collections. In Proceedings of COMPSAC-2003 Workshop on Web & Security Informatics, Dallas, TX, Nov
2003 view
E.C. Laskari, G.C. Meletiou, D.K. Tasoulis and M.N. Vrahatis. Data Mining and Cryptology. International
Conference of Computational Methods in Sciences and Enginnering 2003 (ICCMSE 2003), pp. 346-349, 2003
S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing
Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view
S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE
ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM
2003: 613-616 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in
Association Rule Mining. IDEAS 2003: 54-65 view
Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in
Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data
Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton,
C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view
Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The
Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003 view
Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent
Patterns. TR02-13, Jun 2002 (technical report) view
Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules
in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287,
Volume 1 - Issue 3, 2006 view
Stanley R. M. Oliveira, Osmar R. Zaïane, Yücel Saygin. Secure Association Rule Sharing. PAKDD 2004:
74-85 view
Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693
view
J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents.
Engineering Applications of Artificial Intelligence, 2005 view
12
210. Josenildo Costa da Silva, Matthias Klusch. Inference on Distributed Data Clustering. MLDM 2005: 610-619
211. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer
Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view
212. Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc.
213.
214.
215.
216.
217.
of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30,
2005 view
En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in
Association Rules Mining. COMPSAC (1) 2005 : 511-516 view
Shyue-Liang Wang and Ayat Jafari. Using Unknowns for Hiding Sensitive Predictive Association Rules.
2005 IEEE International Conference on Information Reuse and Integration, Hilton, Las Vegas, Nevada, USA,
August 15-17, 2005
Shyue-Liang Wang, Yu-Huei Lee, Steve Billis, Ayat Jafari. Hiding sensitive items in privacy preserving
association rule mining. SMC (4) 2004: 3239-3244
Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and
Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view
Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A
Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach,
California, USA html
11. Verykios, V.S., Moustakides, G.V. A Decision Model for Cost Optimal Record Matching, In
Proceedings of Affiliates Workshop on Data Quality, pp. 8, December 2000, Morristown,
NJ, USA.
12. Verykios, V.S., Elmagarmid, A.K., Elfeky, M., Cochinwala, M., and Dalal, S. On the
Completeness and Accuracy of the Record Matching Process. In Proceedings of the MIT
Conference on Information Quality, pp. 54-69, October 2000, Boston, MA, USA.
Citations
218. Peter Christen, Tim Churches , Markus Hegland. A Parallel Open Source Data Linkage System. In the Proc
of The Eighth Pacific-Asia Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 2004
view
219. Peter Christen, Tim Churches and Justin Xi Zhu. Probabilistic Name and Address Cleaning and
Standardization. Presented at the Australasian Data Mining Workshop, Canberra, December 2002 view
13. Verykios, V.S., Houstis, E.N., and Rice, J.R. Mining the Performance of Complex Systems.
In Proceedings of IEEE International Conference on Intelligence, Information and Systems
(ICIIS’99), pp. 606-612, November 1999, Bethesda, MD, USA.
14. Atallah, M., Bertino, E., Elmagarmid, A.K., Ibrahim, M., and Verykios, V.S. Disclosure
Limitation of Sensitive Rules. In Proceedings of 1999 IEEE Knowledge and Data
Engineering Exchange Workshop (KDEX’99) pp. 45-52, November 1999, Chicago, IL,
USA.
Citations
220. Shipra Agrawal. High-Performance Algorithms for Privacy-Preserving Mining. Master's Thesis, July 2004
view
221. Shipra Agrawal, Jayant R. Haritsa. A Framework for High-Accuracy Privacy-Preserving Mining. ICDE
2005: 193-204 view
13
222. Shipra Agrawal, Vijay Krishnan, Jayant R. Haritsa. On Addressing Efficiency Concerns in PrivacyPreserving Mining. DASFAA 2004: 113-124 view
223. Anbumani, K., Nedunchezhian, R. Rapid Privacy Preserving Algorithm for Large Databases. International
Journal of Intelligent Information Technologies, Vol. 2, Issue 1, 2006
224. Ashrafi, M Z, Taniar, D & Smith, K.A. Reducing Communication Cost in a Privacy Preserving Distributed
Association Rule Mining. Lecture Notes in Computer Science , vol. 2973, no. 1, pp. 381-392, 2004
225. Ashrafi, M.Z., Taniar, D., and Smith, K.A. PPDAM: Privacy Preserving Distributed Association Rule Mining
226.
227.
228.
229.
230.
231.
232.
233.
234.
235.
236.
237.
238.
239.
240.
241.
242.
243.
244.
245.
246.
247.
Algorithm. International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 49-69, Jan-Mar 2005
view
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti and Dino Pedreschi. Anonymity Preserving Pattern
Discovery. Technical Report. May 2006 view
Chris Clifton. Using Sample Size to Limit Exposure to Data Mining. Journal of Computer Security 8(4):
(2000) view
C. Clifton, M. Kantarcioglu, and J. Vaidya. Defining privacy for data mining. In H. Kargupta, A. Joshi, and K.
Sivakumar, editors, National Science Foundation Workshop on Next Generation Data Mining, pages 126-133,
Baltimore, MD, Nov. 1-3 2002 view
Fienberg, S.E. and Slavkovic, A.B. Preserving the Confidentiality of Categorical Statistical Data Bases
When Releasing Information for Association Rules. In Proc. of Data Mining and Knowledge Discovery
Journal, 2004 view
Sebastien Gambs. Balazs Kegl. Esma Aımeur. Privacy-Preserving Boosting. In proc. Data Mining and
Knowledge Discovery, April 2005 view
E.C. Laskari, G.C. Meletiou, D.K. Tasoulis and M.N. Vrahatis. Data Mining and Cryptology. International
Conference of Computational Methods in Sciences and Enginnering 2003 (ICCMSE 2003), pp. 346-349, 2003
Kun Liu, Hillol Kargupta, Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for
Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering,
January 2006 (Vol. 18, No. 1) pp. 92-106 view
Guanling Lee, Chien-Yu Chang, Arbee L. P. Chen. Hiding Sensitive Patterns in Association Rules Mining.
COMPSAC 2004: 424-429 view
Malika Mahoui and Bharat Bhargava and Mukesh Mohania. Data Mining for Web Security: UserWatcher.
CERIAS TR 2001-20 view
S. Menon, S. Sarkar & S. Mukherjee. Maximizing Accuracy of Shared Databases when Concealing
Sensitive Patterns. In proc of Information Systems Research, Vol. 16, No. 3, September 2005 view
Taneli Mielikainen. Privacy Problems with Anonymized Transaction Databases. Discovery Science 2004:
219-229 view
Natwichai, J., Li, X. and Orlowska, M.E. A Reconstruction-based Algorithm for Classification Rules
Hiding. In Proc. Seventeenth Australasian Database Conference (ADC2006), Hobart, Tasmania, Australia, 1619 January, vol 49, pp. 49-58, 2006, view
E. Newton, L. Sweeney, and B. Malin. Preserving Privacy by De-identifying Facial Images. IEEE
Transactions on Knowledge and Data Engineering, 17(2) February 2005 pp. 232-243 view
S. R. M. Oliveira and O. R. Zaïane. Privacy Preserving Frequent Itemset Mining. In Proceedings of IEEE
ICDM Workshop on Privacy, Security and Data Mining, Maebashi City, Japan, December 2002, pp.43-54 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Protecting Sensitive Knowledge By Data Sanitization. ICDM
2003: 613-616 view
Stanley R. M. Oliveira, Osmar R. Zaïane, Yücel Saygin. Secure Association Rule Sharing. PAKDD 2004:
74-85 view
Stanley R. M. Oliveira, Osmar R. Zaïane. Algorithms for Balancing Privacy and Knowledge Discovery in
Association Rule Mining. IDEAS 2003: 54-65 view
Stanley R. M. Oliveira and Osmar R. Zaiane. A Framework for Enforcing Privacy in Mining Frequent
Patterns. TR02-13, Jun 2002 (technical report) view
Stanley R. M. Oliveira and Osmar R. Zaiane. An Efficient One-Scan Sanitization For Improving The
Balance Between Privacy And Knowledge Discovery. Canada, TR03-15, Jun 2003 view
Oliveira, S.R.M. and Zaiane, O.R. Foundations for an Access Control Model for Privacy Preservation in
Multi-Relational Association Rule Mining. In Proc. IEEE ICDM Workshop on Privacy, Security and Data
Mining, Maebashi City, Japan. Conferences in Research and Practice in Information Technology, 14. Clifton,
C. and Estivill-Castro, V., Eds., ACS. 19-26, 2002 view
Stanley R.M. Oliveira, Osmar R. Zaiane, A Unified Framework for Protecting Sensitive Association Rules
in Business Collaboration, International Journal of Business Intelligence and Data Mining, pp 247-287,
Volume 1 - Issue 3, 2006 view
Shariq Rizvi, Jayant R. Haritsa. Maintaining Data Privacy in Association Rule Mining. VLDB 2002: 682-693
view
14
248. J. da Silva, C. Giannella, R. Bhargava, H. Kargupta, and M. Klusch. Distributed Data Mining and Agents.
Engineering Applications of Artificial Intelligence, 2005 view
249. Josenildo Costa da Silva, Matthias Klusch. Inference on Distributed Data Clustering. MLDM 2005: 610-619
250. Josenildo Costa da Silva, Matthias Klusch, Stefano Lodi, Gianluca Moro. Inference Attacks in Peer-to-Peer
Homogeneous Distributed Data Mining. ECAI 2004: 450-454 view
251. Xingzhi Sun and Philip S. Yu. A Border-Based Approach for Hiding Sensitive Frequent Itemsets. In Proc.
252.
253.
254.
255.
of the Fifth IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, USA, November 27-30,
2005 view
Staal A. Vinterbo. Privacy: A Machine Learning View. IEEE Transactions on Knowledge and Data
Engineering, Volume 16 , Issue 8 (August 2004), Pages: 939 - 948 view
En Tzu Wang , Guanling Lee , Yu Tzu Lin. A Novel Method for Protecting Sensitive Knowledge in
Association Rules Mining. COMPSAC (1) 2005 : 511-516 view
Yongge Wang and Xintao Wu. Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and
Approximation. In the Fifth IEEE International Conference on Data Mining, Houston, Texas, USA, 2005 view
Xintao Wu, Ying Wu, Yongge Wang, Yingjiu Li. Privacy-Aware Market Basket Data Set Generation: A
Feasible Approach for Inverse Frequent Set Mining. In proc of in the 2005 SIAM 2005 : Newport Beach,
California, USA html
15. Pantazopoulos, K.N., Verykios, V.S., and Houstis, E.N. A Knowledge-Based System for
the Evaluation of Option Pricing Algorithms. In Proceedings of 4th IEEE/IAFE/INFORMS
Conference on Computational Intelligence in Financial Engineering (CIFEr'98), pp.123-140,
March 1998, New York, NY, USA.
16. Houstis, C.H., Papatheodorou, T.S., Verykios, V.S., Floratos, A. and Elmagarmid, A.K.
BIND: A Biomedical Interoperable Database System. In Proceedings of 5th International
Conference on Database Expert System Applications (DEXA’94), pp.671-679, September
1994, Athens, Greece (Lecture Notes in Computer Science, vol. 856, Springer 1994).
Citations
256. Toni Kazic. Semiotes. A Semantics for Sharing. Bioinformatics. 16:1129-1144, 2000 view
17. Vergis, A. and Verykios, V.S. On the Testability of Purely Recursive Digital Filters. In
Proceedings of 6th International Conference on Parallel Architectures and Languages
Europe (PARLE’ 94), pp. 85-96, July 1994, Athens, Greece (Lecture Notes in Computer
Science, vol. 817, Springer 1994).
ΔΗΜΟΣΙΕΥΣΕΙΣ ΥΠΟ ΚΡΙΣΗ
1. Cochinwala, M., Dalal, S., Elmagarmid, A.K., and Verykios, V.S., Record Matching: Past,
Present and Future. Submitted to ACM Computing Surveys.
ΤΕΧΝΙΚΕΣ ΑΝΑΦΟΡΕΣ
1. Elmagarmid, A.K., Hpeirotis, P. and Verykios, V.S.. Duplicate Record Detection.
Technical Report, New York University, March 14, 2006
15
2. Elfeky, M.G., Verykios, V.S., Elmagarmid, A.K., Ghanem, T.M., Huwait, A.R. Record
Linkage: A Machine Learning Approach, A Toolbox, and a Digital Government Web
Service. Available as Technical Report CSD-TR #03-024, Department of Computer
Sciences, Purdue University, July 2003.
3. Cochinwala, M., Dalal, S., Elmagarmid, A.K., and Verykios, V.S. Record Matching:
Past, Present and Future. Available as Technical Report CSD-TR #01-013, Department
of Computer Sciences, Purdue University, July 2001.
Citations
257. Rundqvist, David. Grouping Biological Data. Undergraduate thesis Y-level 20 p. (Bioinformatics). Linköping
University, Department of Computer and Information Science. April 2006 view
4.
Verykios, V.S., Elmagarmid, A.K., and Moustakides, G.V. Cost Optimal Record/Entity
Matching. Available as Technical Report CSD-TR #01-014, Department of Computer
Sciences, Purdue University, July 2001.
5.
Houstis, E.N., Catlin, A.C., Rice, J.R., Verykios, V.S., Ramakrishnan, N. and Houstis,
C.H. PYTHIA-II: A Knowledge/Database system for Managing Performance Data and
Recommending Scientific Software. Available as Technical Report CSD-TR #99-31,
Department of Computer Sciences, Purdue University, March 2000.
6.
Verykios, V.S., Elmagarmid, A.K., and Houstis, E.N. Record Matching to Improve Data
Quality. Available as Technical Report CSD-TR #99-005, Department of Computer
Sciences, Purdue University, February 1999.
7.
Verykios, V.S., and Houstis, E.N. Parallel ELLPACK 3D Problem Solving Environment.
Available as Technical Report CSD-TR #97-028, Department of Computer Sciences,
Purdue University, May 1997.
16
Related documents