


Остановите войну!
for scientists:


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 395 matches
- 2023
- Yogesh R. Kulkarni, Balaso Jagdale, Shounak Rushikesh Sugave:
Optimized key generation-based privacy preserving data mining model for secure data publishing. Adv. Eng. Softw. 175: 103332 (2023) - Vankamamidi Srinivasa Naresh
, Muthusamy Thamarai:
Privacy-preserving data mining and machine learning in healthcare: Applications, challenges, and solutions. WIREs Data. Mining. Knowl. Discov. 13(2) (2023) - Dhinakaran D, Joe Prathap P. M:
A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining. CoRR abs/2304.14607 (2023) - 2022
- Saad M. Darwish
, Reham M. Essa, Mohamed A. Osman, Ahmed A. Ismail:
Privacy Preserving Data Mining Framework for Negative Association Rules: An Application to Healthcare Informatics. IEEE Access 10: 76268-76280 (2022) - G. Sathish Kumar, K. Premalatha:
Privacy preserving data mining - past and present. Int. J. Bus. Intell. Data Min. 21(2): 149-170 (2022) - Ila Chandrakar:
Improved Technique for Preserving Privacy while Mining Real Time Big Data. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - Anifat M. Olawoyin, Carson K. Leung:
Preserving Privacy Integration and Mining for Big Temporal Co-occurrence Patterns. Big Data 2022: 3959-3968 - 2021
- Nikunj Domadiya
, Udai Pratap Rao:
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining. Computing 103(1): 155-177 (2021) - Chang Sun
, Lianne Ippel
, Andre Dekker
, Michel Dumontier
, Johan van Soest
:
A systematic review on privacy-preserving distributed data mining. Data Sci. 4(2): 121-150 (2021) - Jimmy Ming-Tai Wu, Gautam Srivastava
, Unil Yun, Shahab Tayeb, Jerry Chun-Wei Lin
:
An evolutionary computation-based privacy-preserving data mining model under a multithreshold constraint. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - Jae-Seong Lee, Seung-Pyo Jun:
Privacy-preserving data mining for open government data from heterogeneous sources. Gov. Inf. Q. 38(1): 101544 (2021) - R. Lalitha, K. Rameshkumar:
Cluster-based convolution process on big data in privacy preserving data mining. Int. J. Bus. Inf. Syst. 38(1): 17-33 (2021) - Musavir Hassan, Muheet Ahmed Butt, Majid Zaman:
An Ensemble Random Forest Algorithm for Privacy Preserving Distributed Medical Data Mining. Int. J. E Health Medical Commun. 12(6): 1-23 (2021) - Hjalmar K. Turesson, Henry M. Kim, Marek Laskowski, Alexandra Roatis:
Privacy Preserving Data Mining as Proof of Useful Work: Exploring an AI/Blockchain Design. J. Database Manag. 32(1): 69-85 (2021) - Nikunj Domadiya
, Udai Pratap Rao:
Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study. SN Comput. Sci. 2(6): 418 (2021) - Chance N. DeSmet, Diane J. Cook:
Recent Developments in Privacy-preserving Mining of Clinical Data. Trans. Data Sci. 2(4): 28:1-28:32 (2021) - N. V. Kousik, K. Premalatha:
An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation. J. Supercomput. 77(9): 10003-10011 (2021) - Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - Maria Luisa Merani
, Daniele Croce
, Ilenia Tinnirello
:
Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data Mining. IEEE Trans. Parallel Distributed Syst. 32(6): 1340-1352 (2021) - Inda Kreso
, Amra Kapo
, Lejla Turulja
:
Data mining privacy preserving: Research agenda. WIREs Data Mining Knowl. Discov. 11(1) (2021) - Md. Ileas Pramanik, Raymond Y. K. Lau, Md. Sakir Hossain, Md-Mizanur Rahoman, Sumon Kumar Debnath, Md. Golam Rashed
, Md. Zasim Uddin:
Privacy preserving big data analytics: A critical analysis of state-of-the-art. WIREs Data Mining Knowl. Discov. 11(1) (2021) - Ezgi Zorarpaci, Selma Ayse Özel
:
Privacy preserving classification over differentially private data. WIREs Data Mining Knowl. Discov. 11(3) (2021) - Virendra Dani
, Priyanka Kokate, Surbhi Kushwah, Swapnil Waghela:
Privacy Preserving Data Mining Technique to Secure Distributed Client Data. HIS 2021: 565-574 - Usman Ahmed, Jerry Chun-Wei Lin, Gautam Srivastava, Youcef Djenouri
:
A Deep Q-Learning Sanitization Approach for Privacy Preserving Data Mining. ICDCN (Adjunct Volume) 2021: 43-48 - Weimin Ouyang:
Privacy Preserving Mining Sequential Pattern based on Random Data Perturbation. ICSAI 2021: 1-6 - Majid Rafiei, Wil M. P. van der Aalst:
Privacy-Preserving Data Publishing in Process Mining. CoRR abs/2101.02627 (2021) - 2020
- Nawal Almutairi:
Privacy: preserving third party data mining using cryptography. University of Liverpool, UK, 2020 - Jun Liu, Yuan Tian, Yu Zhou, Yang Xiao
, Nirwan Ansari
:
Privacy preserving distributed data mining based on secure multi-party computation. Comput. Commun. 153: 208-216 (2020) - Benjamin Denham
, Russel Pears, M. Asif Naeem
:
Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining. Expert Syst. Appl. 152: 113380 (2020) - Jyoti Lamba, V. Ch. Venkaiah:
Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme. Int. J. Inf. Priv. Secur. Integr. 4(3): 203-225 (2020)
skipping 365 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2023-06-01 17:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint