Dissertations / Theses on the topic 'Privacy Preserving Data Mining (PPDM)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 49 dissertations / theses for your research on the topic 'Privacy Preserving Data Mining (PPDM).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Swapna, B., and R. VijayaPrakash. "Privacy Preserving Data Mining Operations without Disrupting Data Quality." International Journal of Computer Science and Network (IJCSN), 2012. http://hdl.handle.net/10150/271473.
Full textZhang, Nan. "Privacy-preserving data mining." [College Station, Tex. : Texas A&M University, 2006. http://hdl.handle.net/1969.1/ETD-TAMU-1080.
Full textLin, Zhenmin. "Privacy Preserving Distributed Data Mining." UKnowledge, 2012. http://uknowledge.uky.edu/cs_etds/9.
Full textBalla, Stefano. "Privacy-Preserving Data Mining: un approccio verticale." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17517/.
Full textMa, Jianjie. "Learning from perturbed data for privacy-preserving data mining." Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Summer2006/j%5Fma%5F080406.pdf.
Full textHajYasien, Ahmed. "Preserving Privacy in Association Rule Mining." Thesis, Griffith University, 2007. http://hdl.handle.net/10072/365286.
Full textCasas, Roma Jordi. "Privacy-preserving and data utility in graph mining." Doctoral thesis, Universitat Autònoma de Barcelona, 2014. http://hdl.handle.net/10803/285566.
Full textNabar, Shubha Umesh. "Models and algorithms for privacy-preserving data mining /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textSecretan, James. "AN ARCHITECTURE FOR HIGH-PERFORMANCE PRIVACY-PRESERVING AND DISTRIBUTED DATA MINING." Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2504.
Full textLiu, Lian. "PRIVACY PRESERVING DATA MINING FOR NUMERICAL MATRICES, SOCIAL NETWORKS, AND BIG DATA." UKnowledge, 2015. http://uknowledge.uky.edu/cs_etds/31.
Full textSehatkar, Morvarid. "Towards a Privacy Preserving Framework for Publishing Longitudinal Data." Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31629.
Full textParameswaran, Rupa. "A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11459.
Full textAlotaibi, Khaled. "Non-metric multi-dimensional scaling for distance-based privacy-preserving data mining." Thesis, University of East Anglia, 2014. https://ueaeprints.uea.ac.uk/52228/.
Full textKINSEY, MICHAEL LOY. "PRIVACY PRESERVING INDUCTION OF DECISION TREES FROM GEOGRAPHICALLY DISTRIBUTED DATABASES." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1123855448.
Full textLi, Zhizhou. "Multi-Scheme Fully Homomorphic Encryptions And Its Application In Privacy Preserving Data Mining." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1430760068.
Full textJafer, Yasser. "Task Oriented Privacy-preserving (TOP) Technologies Using Automatic Feature Selection." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/34320.
Full textThapa, Nirmal. "CONTEXT AWARE PRIVACY PRESERVING CLUSTERING AND CLASSIFICATION." UKnowledge, 2013. http://uknowledge.uky.edu/cs_etds/15.
Full textChen, Keke. "Geometric Methods for Mining Large and Possibly Private Datasets." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11561.
Full textShepard, Samuel Steven. "Anonymous Opt-Out and Secure Computation in Data Mining." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1194282001.
Full textLaMacchia, Carolyn. "Improving the Scalability of an Exact Approach for Frequent Item Set Hiding." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/205.
Full textFong, Pui Kuen. "Privacy Preserving Data Mining using Unrealized Data Sets: Scope Expansion and Data Compression." Thesis, 2013. http://hdl.handle.net/1828/4623.
Full textSharma, Bikash, and Aman Jain. "Privacy preserving data mining." Thesis, 2007. http://ethesis.nitrkl.ac.in/4218/1/PRIVACY_PRESERVING_DATA_MINING_27.pdf.
Full text"Privacy preserving data publishing." Thesis, 2008. http://library.cuhk.edu.hk/record=b6074672.
Full textBrickell, Justin Lee. "Privacy-preserving computation for data mining." 2009. http://hdl.handle.net/2152/7538.
Full textSinha, B. K., and J. Kumar. "Privacy Preserving Clustering In Data Mining." Thesis, 2010. http://ethesis.nitrkl.ac.in/1789/1/thesis.pdf.
Full textIllia, Leshchenko, and Leshchenko Illia. "Data Security: Modified Privacy-Preserving Data Mining Algorithm." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/60128231051349181874.
Full textBabu, Korra Sathya. "Utility-Based Privacy Preserving Data Publishing." Thesis, 2013. http://ethesis.nitrkl.ac.in/5487/1/Korra_Sathya_Babu.pdf.
Full textWilliams, James. "Unrealization approaches for privacy preserving data mining." Thesis, 2010. http://hdl.handle.net/1828/3156.
Full textWu, Wen-chung, and 吳文群. "Privacy-Preserving Frequent-Itemset Mining of Data Streams." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/8s4by4.
Full textYang, Kuo-Tung, and 楊國棟. "Several Heuristic Approaches to Privacy-Preserving Data Mining." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/51265621784508458978.
Full textXu, Zhuojia. "Analysis of privacy preserving distributed data mining protocols." Thesis, 2011. https://vuir.vu.edu.au/16047/.
Full textHou, Pei-Wen, and 侯佩文. "A Study of Reversible Privacy-preserving Data Mining Technology." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/48a2yt.
Full textLiu, Li. "Perturbation based privacy preserving data mining techniques for real-world data /." 2008. http://proquest.umi.com/pqdweb?did=1546799921&sid=7&Fmt=2&clientId=10361&RQT=309&VName=PQD.
Full textLin, Hsiu-Chung, and 林秀忠. "An Entropy-Based Hiding Algorithm for Privacy Preserving Data Mining." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/6887a4.
Full textWu, Chieh-Ming, and 吳界明. "Data mining for generalized association rules and privacy preservingData mining for generalized association rules and privacy preserving." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/85543535661382633122.
Full text"Privacy preserving in serial data and social network publishing." 2010. http://library.cuhk.edu.hk/record=b5894365.
Full textYuan-Chung, Chang, and 張淵琮. "The study on privacy-preserving association rule mining for data sharing." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10395401470955928759.
Full textChang, Yin-Ming, and 張穎銘. "Protocol design for privacy-preserving data mining using partial homomorphic encryption." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/14961139955051252325.
Full textChen, Ling-Chieh, and 陳凌潔. "A study of Privacy Preserving Data Mining Based on Hash Function." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/73184017853463753993.
Full textPinto, Gustavo de Castro Nogueira. "A Secure and Privacy Preserving Approach to Medical Data Mining Applications." Master's thesis, 2018. https://repositorio-aberto.up.pt/handle/10216/114065.
Full textDlamini, Mbuso Gerald, and Mbuso Gerald Dlamini. "Privacy Preserving Data Mining and Association Rule Sharing for Business Intelligence." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/7sefy2.
Full textPinto, Gustavo de Castro Nogueira. "A Secure and Privacy Preserving Approach to Medical Data Mining Applications." Dissertação, 2018. https://repositorio-aberto.up.pt/handle/10216/114065.
Full textchunlakan, Khunanon, and 朱恩榮. "A Study of K-anonymity Model for Privacy Preserving Data Mining." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/2r9pqh.
Full textPaulet, Russell. "Design and analysis of privacy-preserving protocols." Thesis, 2013. https://vuir.vu.edu.au/24832/.
Full textHlatshwayo, Muzi Wandile, and Muzi Wandile Hlatshwayo. "Privacy Preserving Data Mining and Association Rule Sharing Using The High Lift Algorithm." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6vyhq3.
Full textPark, Yubin. "CUDIA : a probabilistic cross-level imputation framework using individual auxiliary information." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-12-4746.
Full textAl-Ahmadi, Mohammad Saad. "Adapting masking techniques for estimation problems involving non-monotonic relationships in privacy-preserving data mining." 2006. http://digital.library.okstate.edu/etd/umi-okstate-1982.pdf.
Full textWang, Peter Shaojui, and 王紹睿. "Design of a Privacy-Preserving Data Mining System Based on Differential Privacy Using Additive-Homomorphic Proxy Re-Encryption Protocol Against Insider Attacks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63639699902141668295.
Full textΚαγκλής, Βασίλειος. "Novel frequent itemset hiding techniques and their evaluation." Thesis, 2015. http://hdl.handle.net/10889/8746.
Full text