Privacy-preserving two-party distributed association rules mining on horizontally partitioned data

F Zhang, C Rong, G Zhao, J Wu… - … Conference on Cloud …, 2013 - ieeexplore.ieee.org
In many applications, data mining has to be done in distributed data scenarios. In such
situations, data owners may be concerned with the misuse of data, hence, they do not want …

[PDF][PDF] Privacy in microdata release: Challenges, techniques, and approaches

G Livraga - Data-Driven Policy Impact Evaluation: How Access …, 2018 - library.oapen.org
We live in a society that relies more and more on the availability of data to make knowledge-
based decisions (Livraga, 2015). The benefits that can be driven by data sharing and …

Preserving privacy between features in distributed estimation

C Heinze‐Deml, B McWilliams, N Meinshausen - stat, 2018 - Wiley Online Library
Privacy is crucial in many applications of machine learning. Legal, ethical and societal
issues restrict the sharing of sensitive data, making it difficult to learn from data sets that are …

[PDF][PDF] A survey on privacy preservation recent approaches and techniques

K Dhivakar, S Mohana - International Journal of Innovative Research in …, 2014 - Citeseer
Data mining is a process of extracting useful knowledge from large data sets. The typical
process of data collection and data dissemination result in a possible risk of privacy threats …

Data fusion in Internet of Medical Things: towards trust management, security, and privacy

D Sadhukhan, S Ray, M Dasgupta - Data Fusion Techniques and …, 2024 - Elsevier
The advent of Internet of Medical Things (IoMT) has led to a massive revolution in simplifying
patient disease monitoring management approaches, improving diagnosis and treatment …

Software-based delay fault testing of processor cores

Singh, Inoue, Saluja, Fujiwara - 2003 Test Symposium, 2003 - ieeexplore.ieee.org
This paper presents a software-based self-testing methodology for delay fault testing. Delay
faults affect the circuit functionality only when it can be activated in functional mode. A …

Efficient and private approximations of distributed databases calculations

P Derbeko, S Dolev, E Gudes… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
In recent years, an increasing amount of data is collected in different and often, not
cooperative, databases. The problem of privacy-preserving, distributed calculations over …

Privacy-Preserving Federated Analytics using Multiparty Homomorphic Encryption

DJ Froelicher - 2021 - infoscience.epfl.ch
Analyzing and processing data that are siloed and dispersed among multiple distrustful
stakeholders is difficult and can even become impossible when the data are sensitive or …

[PDF][PDF] Differentially private and distributed Bayesian learning

M Heikkilä - 2023 - helda.helsinki.fi
Abstract Machine learning aims to learn patterns from data. When the data are about people,
a machine learning model will learn information about people. Such models can be used by …

Identifying relations between frequent patterns mined at two collaborative websites

J Wang, E Kodama, T Takata - International Journal of …, 2015 - inderscienceonline.com
In modern business world, very often two companies collaborate with each other for their
mutual benefit in such a way that, the one starts a transaction and processes a part of it, then …