|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Charu C. Aggarwal , Philip S. YuPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: 2008 ed. Volume: 34 Dimensions: Width: 15.50cm , Height: 3.00cm , Length: 23.50cm Weight: 2.040kg ISBN: 9780387709918ISBN 10: 0387709916 Pages: 514 Publication Date: 07 July 2008 Audience: College/higher education , Undergraduate , Postgraduate, Research & Scholarly Format: Hardback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsAn Introduction to Privacy-Preserving Data Mining.- A General Survey of Privacy-Preserving Data Mining Models and Algorithms.- A Survey of Inference Control Methods for Privacy-Preserving Data Mining.- Measures of Anonymity.- k-Anonymous Data Mining: A Survey.- A Survey of Randomization Methods for Privacy-Preserving Data Mining.- A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining.- A Survey of Quantification of Privacy Preserving Data Mining Algorithms.- A Survey of Utility-based Privacy-Preserving Data Transformation Methods.- Mining Association Rules under Privacy Constraints.- A Survey of Association Rule Hiding Methods for Privacy.- A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries.- A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data.- A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data.- A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods.- Private Data Analysis via Output Perturbation.- A Survey of Query Auditing Techniques for Data Privacy.- Privacy and the Dimensionality Curse.- Personalized Privacy Preservation.- Privacy-Preserving Data Stream Classification.ReviewsFrom the reviews: This book provides an exceptional summary of the state-of-the-art accomplishments in the area of privacy-preserving data mining, discussing the most important algorithms, models, and applications in each direction. The target audience includes researchers, graduate students, and practitioners who are interested in this area. ... I recommend this book to all readers interested in privacy-preserving data mining. (Aris Gkoulalas-Divanis, ACM Computing Reviews, October, 2008) From the reviews: This book provides an exceptional summary of the state-of-the-art accomplishments in the area of privacy-preserving data mining, discussing the most important algorithms, models, and applications in each direction. The target audience includes researchers, graduate students, and practitioners who are interested in this area. ... I recommend this book to all readers interested in privacy-preserving data mining. (Aris Gkoulalas-Divanis, ACM Computing Reviews, October, 2008) From the reviews: This book provides an exceptional summary of the state-of-the-art accomplishments in the area of privacy-preserving data mining, discussing the most important algorithms, models, and applications in each direction. The target audience includes researchers, graduate students, and practitioners who are interested in this area. ! I recommend this book to all readers interested in privacy-preserving data mining. (Aris Gkoulalas-Divanis, ACM Computing Reviews, October, 2008) Author InformationTab Content 6Author Website:Countries AvailableAll regions |