Privacy Preserving Distributed Data Mining Bibliography

[1] J. Al-Muhtadi, R. Campbell, A. Kapadia, M. D. Mickunas, and S. Yi. Routing through the mist: Privacy preserving communication in ubiquitous computing environments. In Proceedings of ICDCS'02, pages 74-83, Vienna, Austria, June July.
[ bib | http://ieeexplore.ieee.org/iel5/7958/21986/01022244.pdf ]
[2] M. J. Atallah and W. Du. Secure Multi-Party Computational Geometry. In Proceedings of 7th International Workshop on Algorithms and Data Structures (WADS 2001), volume 2125 of Lecture Notes in Computer Science, pages 165-179, Providence, RI, August 2001. Springer Verlag.
[ bib | http://portal.acm.org/citation.cfm?id=756665 ]
[3] Roberto J. Bayardo and Rakesh Agrawal. Data privacy through optimal k-anonymization. In The 21st International Conference on Data Engineering (ICDE 2005), Tokyo, Japan, April 2005.
[ bib | http://ieeexplore.ieee.org/iel5/9680/30564/01410124.pdf ]
[4] Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy and ownership preserving of outsourced medical data. In The 21st International Conference on Data Engineering (ICDE 2005), Tokyo, Japan, April 2005.
[ bib | http://ieeexplore.ieee.org/iel5/9680/30564/01410166.pdf ]
[5] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, , and M. Zhu. Tools for Privacy Preserving Distributed Data Mining. ACM SIGKDD Explorations, 4(2), December 2002.
[ bib | http://www.cs.purdue.edu/homes/clifton/DistDM/kddexp.pdf ]
[6] W. Du and M. J. Atallah. Privacy-Preserving Cooperative Scientific Computations. In 14th IEEE Computer Security Foundations Workshop, pages 273-282, Nova Scotia, Canada, June 2001.
[ bib | http://www.cis.syr.edu/~wedu/Research/paper/csfw2001.pdf ]
[7] W. Du and M. J. Atallah. Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. In New Security Paradigms Workshop, pages 11-20, Cloudcroft, NM, September 2001.
[ bib | http://citeseer.nj.nec.com/article/du01secure.html ]
[8] W. Du and Z. Zhan. Building Decision Tree Classifier on Private Data. In Workshop on Privacy, Security, and Data Mining at The 2002 IEEE International Conference on Data Mining (ICDM'02), Maebashi City, Japan, December 2002.
[ bib | http://citeseer.nj.nec.com/du02building.html ]
[9] Cynthia Dwork and Kobbi Nissim. Privacy-preserving Data mining on Vertically Partitioned Databases. In Proceedings of The 24rd Annual International Cryptology Conference (CRYPTO 2004), Santa Barbara, CA, August 2004.
[ bib | http://theory.stanford.edu/~nmishra/CS369-2004/pdm.ps ]
[10] Benjamin C. M. Fung, Ke Wang, and Philip S. Yu. Top-down specialization for information and privacy preservation. In The 21st International Conference on Data Engineering (ICDE 2005), Tokyo, Japan, April 2005.
[ bib | http://ieeexplore.ieee.org/iel5/9680/30564/01410123.pdf ]
[11] B. Gilburd, A. Schuster, and R. Wolff. Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants. In Proceedings of the 13th International Symposium on High-Performance Distributed Computing, pages 225-234, Honolulu, Hawaii, June 2004.
[ bib | ]
[12] Bobi Gilburd, Assaf Schuster, and Ran Wolff. k-TTP: a New Privacy Model for Large-scale Distributed Environments. In 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 563-568, Seattle, WA, August 2004.
[ bib | http://www.cs.technion.ac.il/~assaf/publications/MP4ARM_KDD.pdf ]
[13] C. Jones, J. Hall, and J. Jale. Secure Distributed Database Mining: Principles of Design. In Hillol Kargupta and Phillip Chan, editors, Advances in Distributed Data Mining, pages 273-291. MIT/AAAI Press, 2000.
[ bib | ]
[14] P. Kamat, W. Xu, W. Trappe, and Y. Zhang. Temporal Privacy in Wireless Sensor Networks. In Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS '07), page 23, Toronto, Canada, 2007.
[ bib | http://portal.acm.org/citation.cfm?id=1270857 ]
[15] M. Kantarcioglu and C. Clifton. Privacy-preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. In ACM SIGMOD Workshop on Research Issues on DMKD'02, June 2002.
[ bib | http://citeseer.nj.nec.com/kantarcioglu02privacypreserving.html ]
[16] M. Kantarcioglu and J. Vaidya. A New Architecture for Privacy Preserving Data Mining. In Privacy, Security and Data Mining of the ACS Series Conferences in Research and Practice in Information Technology, volume 14, 2002.
[ bib | http://www.cs.purdue.edu/homes/jsvaidya/pub-papers/icdm02psdm.pdf ]
[17] M. Kantarcioglu and J. Vaidya. An Architecture for Privacy-preserving Mining of Client Information. In Chris Clifton and Vladimir Estivill-Castro, editors, IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, volume 14, pages 37-42, Maebashi City, Japan, December 2002.
[ bib | http://crpit.com/confpapers/CRPITV14Kantarcioglu.pdf ]
[18] Murat Kantarcioglu and Chris Clifton. Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. IEEE Transactions on Knowledge and Data Engineering, 16:1026-1037, September 2004.
[ bib | http://www.cs.purdue.edu/homes/jsvaidya/pub-papers/kdd02.pdf ]
[19] H. Kargupta, K. Das, and K. Liu. Multi-Party, Privacy-Preserving Distributed Data Mining using a Game Theoretic Framework. In Proceedings of the 11th European Conference on Principles and Practice of Knowledge Discovery in Databases(PKDD), pages 523-531, Warsaw, Poland, 2007.
[ bib | http://www.springerlink.com/content/a61l028j53pl8476/ ]
[20] H. Kargupta, K. Liu, and J. Ryan. Random Projection and Privacy Preserving Correlation Computation from Distributed Data. In HPDM: High Performance, Pervasive, and Data Stream Mining 6th International Workshop on High Performance Data Mining: Pervasive and Data Stream Mining (HPDM:PDS'03). In conjunction with Third International SIAM Conference on Data Mining, San Francisco, CA, May 2003.
[ bib | ]
[21] X. Lin, C. Clifton, and M. Zhu. Privacy Preserving Clustering with Distributed EM Mixture Modeling. Knowledge and Information Systems, to appear.
[ bib | ]
[22] Yehuda Lindell and Benny Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 15(3):177-206, 2002. An extended abstract appeared at the CRYPTO 2000 conference.
[ bib | http://www.wisdom.weizmann.ac.il/~lindell/id3_abs.html ]
[23] Kun Liu, Hillol Kargupta, and Jessica Ryan. Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18(1):92-106, January 2006.
[ bib | http://doi.ieeecomputersociety.org/10.1109/TKDE.2006.14 ]
[24] Da Meng, Krishnamoorthy Sivakumar, and Hillol Kargupta. Privacy Sensitive Bayesian Network Parameter Learning. In Proceedings of The Fourth IEEE International Conference on Data Mining (ICDM'04), Brighton, UK, November 2004.
[ bib | http://www.cs.umbc.edu/~hillol/PUBS/pb.pdf ]
[25] S. Merugu and J. Ghosh. Privacy-preserving Distributed Clustering using Generative Models. In The Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, November 2003.
[ bib | http://citeseer.ist.psu.edu/705042.html ]
[26] H. Polat and W. Du. Privacy-Preserving Collaborative Filtering using Randomized Perturbation Techniques. In The Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, November 2003.
[ bib | http://www.cis.syr.edu/~wedu/Research/paper/icdm2003.pdf ]
[27] Ashish Sanil, Alan Karr, Xiaodong Lin, and Jerome Reiter. Privacy Preserving Regression Modelling via Distributed Computation. In 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, WA, August 2004.
[ bib | http://www.niss.org/dgii/TR/secure-coefficients.pdf ]
[28] Assaf Schuster, Ran Wolff, and Bobi Gilburd. Privacy-Preserving Association Rule Mining in Large-Scale Distributed Systems . In 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid’04), Illinois , USA, April 2004.
[ bib | http://www.cs.technion.ac.il/~assaf/publications/P4ARM_CCGrid.pdf ]
[29] J. Vaidya and C. Clifton. Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002.
[ bib | http://www.cs.purdue.edu/homes/clifton/DistDM/kdd02.pdf ]
[30] J. Vaidya and C. Clifton. Leveraging the ``Multi'' in Secure Multi-Party Computation. In Workshop on Privacy in the Electronic Society held in association with the 10th ACM Conference on Computer and Communications Security, Washington, DC, October 2003.
[ bib | http://portal.acm.org/citation.cfm?id=1005149 ]
[31] J. Vaidya and C. Clifton. Privacy-Preserving K-Means Clustering over Vertically Partitioned Data. In The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, August 2003.
[ bib | http://www.cs.purdue.edu/homes/jsvaidya/pub-papers/vaidya-kmeans.pdf ]
[32] Rebecca Wright and Zhiqiang Yang. Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data. In Proceedings of The Tenth ACM SIGKDD Conference (KDD'04), Seattle, WA, August 2004.
[ bib | http://portal.acm.org/citation.cfm?id=1014145 ]
[33] Sheng Zhong, Zhiqiang Yang, and Rebecca N. Wright. Privacy-enhancing k-anonymization of customer data. In ACM SIGMOD/PODS 2005 Conference, Baltimore, Maryland, June 2005.
[ bib | http://www.cs.stevens.edu/~rwright/Publications/pods05.pdf ]