Privacy-Preserving Data Mining -Models and Algorithms, Advances in Database Systems, 2008. ,
UCI machine learning repository, 2010. ,
A Survey of Quantification of Privacy Preserving Data Mining Algorithms, pp.183-205 ,
DOI : 10.1007/978-0-387-70992-5_8
Attacks on privacy and deFinetti's theorem, Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pp.127-138, 2009. ,
DOI : 10.1145/1559845.1559861
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.4501
The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955. ,
DOI : 10.1002/nav.3800020109
Protecting Individual Information Against Inference Attacks in Data Publishing, Lecture Notes in Computer Science, vol.4443, pp.422-433, 2007. ,
DOI : 10.1007/978-3-540-71703-4_37
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.14
Against Classification Attacks: A Decision Tree Pruning Approach to Privacy Protection in Data Mining, Operations Research, vol.57, issue.6, pp.1496-1509, 2009. ,
DOI : 10.1287/opre.1090.0702
Protecting privacy against regression attacks in predictive data mining, pp.1-15, 2011. ,
Algorithms for the Assignment and Transportation Problems, Journal of the Society for Industrial and Applied Mathematics, vol.5, issue.1, pp.32-38, 1957. ,
DOI : 10.1137/0105003
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.3911
Induction of decision trees, Machine Learning, vol.1, issue.1, pp.81-106, 1986. ,
DOI : 10.1007/BF00116251
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.167.3624
C4.5: Programs for Machine Learning, 1993. ,
A mathematical theory of communication. The Bell Systems Technical, Journal, vol.27, pp.379-423, 1948. ,
State-of-the-art in privacy preserving data mining, ACM SIGMOD Record, vol.33, issue.1, pp.50-57, 2004. ,
DOI : 10.1145/974121.974131
Data mining, ACM SIGMOD Record, vol.31, issue.1, 1999. ,
DOI : 10.1145/507338.507355