Abstract is missing.
- An Introduction to Privacy-Preserving Data MiningCharu C. Aggarwal, Philip S. Yu. 1-9 [doi]
- A General Survey of Privacy-Preserving Data Mining Models and AlgorithmsCharu C. Aggarwal, Philip S. Yu. 11-52 [doi]
- A Survey of Inference Control Methods for Privacy-Preserving Data MiningJosep Domingo-Ferrer. 53-80 [doi]
- ::::k:::: -Anonymous Data Mining: A SurveyValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 105-136 [doi]
- A Survey of Randomization Methods for Privacy-Preserving Data MiningCharu C. Aggarwal, Philip S. Yu. 137-156 [doi]
- A Survey of Multiplicative Perturbation for Privacy-Preserving Data MiningKeke Chen, Ling Liu. 157-181 [doi]
- A Survey of Quantification of Privacy Preserving Data Mining AlgorithmsElisa Bertino, Dan Lin, Wei Jiang. 183-205 [doi]
- A Survey of Utility-based Privacy-Preserving Data Transformation MethodsMing Hua, Jian Pei. 207-237 [doi]
- Mining Association Rules under Privacy ConstraintsJayant R. Haritsa. 239-266 [doi]
- A Survey of Association Rule Hiding Methods for PrivacyVassilios S. Verykios, Aris Gkoulalas-Divanis. 267-289 [doi]
- A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table EntriesStephen E. Fienberg, Aleksandra B. Slavkovic. 291-312 [doi]
- A Survey of Privacy-Preserving Methods Across Horizontally Partitioned DataMurat Kantarcioglu. 313-335 [doi]
- A Survey of Privacy-Preserving Methods Across Vertically Partitioned DataJaideep Vaidya. 337-358 [doi]
- A Survey of Attack Techniques on Privacy-Preserving Data Perturbation MethodsKun Liu, Chris Giannella, Hillol Kargupta. 359-381 [doi]
- Private Data Analysis via Output Perturbation - ::::A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms::::Kobbi Nissim. 383-414 [doi]
- A Survey of Query Auditing Techniques for Data PrivacyShubha U. Nabar, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani. 415-431 [doi]
- Privacy and the Dimensionality CurseCharu C. Aggarwal. 433-460 [doi]
- Personalized Privacy PreservationYufei Tao, Xiaokui Xiao. 461-485 [doi]
- Privacy-Preserving Data Stream ClassificationYabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei. 487-510 [doi]