
This Article  
 
Share  
Bibliographic References  
Add to:  
Digg Furl Spurl Blink Simpy Del.icio.us Y!MyWeb  
Search  
 
ASCII Text  x  
Yingpeng Sang, Hong Shen, Hui Tian, "Effective Reconstruction of Data Perturbed by Random Projections," IEEE Transactions on Computers, vol. 61, no. 1, pp. 101117, January, 2012.  
BibTex  x  
@article{ 10.1109/TC.2011.83, author = {Yingpeng Sang and Hong Shen and Hui Tian}, title = {Effective Reconstruction of Data Perturbed by Random Projections}, journal ={IEEE Transactions on Computers}, volume = {61}, number = {1}, issn = {00189340}, year = {2012}, pages = {101117}, doi = {http://doi.ieeecomputersociety.org/10.1109/TC.2011.83}, publisher = {IEEE Computer Society}, address = {Los Alamitos, CA, USA}, }  
RefWorks Procite/RefMan/Endnote  x  
TY  JOUR JO  IEEE Transactions on Computers TI  Effective Reconstruction of Data Perturbed by Random Projections IS  1 SN  00189340 SP101 EP117 EPD  101117 A1  Yingpeng Sang, A1  Hong Shen, A1  Hui Tian, PY  2012 KW  Privacypreserving data mining KW  data perturbation KW  data reconstruction KW  underdetermined independent component analysis KW  Maximum A Posteriori KW  principal component analysis. VL  61 JA  IEEE Transactions on Computers ER   
[1] N. Adam and J. Worthmann, "SecurityControl Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, pp. 515556, 1989.
[2] PrivacyPreserving Data Mining: Models and Algorithms, C. Aggarwal and P.S. Yu, eds. Springer, 2008.
[3] D. Agrawal and C. Aggarwal, "On the Design and Quantification of Privacy Preserving Data Mining Algorithms," Proc. 20th ACM SIGMODSIGACTSIGART Symp. Principles of Database Systems (PODS), pp. 247255, 2001.
[4] R. Agrawal and R. Srikant, "PrivacyPreserving Data Mining," Proc. 2000 ACM SIGMOD Conf. Management of Data, pp. 439450, 2000.
[5] S. Agrawal and J.R. Haritsa, "A Framework for HighAccuracy PrivacyPreserving Mining," Proc. 21st Int'l Conf. Data Eng. (ICDE '05), pp. 193204, 2005.
[6] M. Atallah, E. Bertino, A. Elmagarmid, M. Ibrahim, and V. Verykios, "Disclosure Limitation of Sensitive Rules," Proc. Workshop Knowledge and Data Eng. Exchange (KDEX '99), pp. 4552, 1999.
[7] P. Bofill and M. Zibulevsky, "Underdetermined Blind Source Separation Using Sparse Representations," Signal Processing, vol. 81, no. 11, pp. 23532362, 2001.
[8] X. Cao and R. Liu, "General Approach to Blind Source Separation," IEEE Trans. Signal Processing, vol. 44, no. 3, pp. 562571, Mar. 1996.
[9] K. Chen, G. Sun, and L. Liu, "Towards AttackResilient Geometric Data Perturbation," Proc. SIAM Int'l Conf. Data Mining (SDM '07), Apr. 2007.
[10] S.S. Chen, D.L. Donoho, and M.A. Saunders, "Atomic Decomposition by Basis Pursuit," SIAM Rev., vol. 43, no. 1, pp. 129159, 2001.
[11] R. Cramer, I. Damgard, and J. Nielsen, "Multiparty Computation from Threshold Homomorphic Encryption," EUROCRYPT '01: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques: Advances in Cryptology, pp. 280300, 2001.
[12] T. Dalenius and S.P. Reiss, "DataSwapping: A Technique for Disclosure Control," J. Statistical Planning and Inference, vol. 6, pp. 7385, 1982.
[13] S. Dasgupta, D. Hsu, and N. Verma, "A Concentration Theorem for Projections," Proc. 22nd Conf. Uncertainty in Artificial Intelligence, pp. 117, 2006.
[14] S. Dasgupta, "Learning Mixtures of Gaussians," Proc. 40th Ann. IEEE Symp. Foundations of Computer Science (FOCS), pp. 634644, 1999.
[15] W. Du and Z. Zhan, "Building Decision Tree Classifier on Private Data," Proc. IEEE ICDM Workshop Privacy, Security and Data Mining (PSDM '02), pp. 18, 2002.
[16] A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting Privacy Breaches in Privacy Preserving Data Mining," Proc. 22nd ACM Symp. Principles of Database Systems (PODS '03), pp. 211222, 2003.
[17] S.E. Fienberg and J. McIntyre, "Data Swapping: Variations on a Theme by Dalenius and Reiss," Proc. Privacy in Statistical Databases, pp. 1429, 2004.
[18] O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications. Cambridge Univ. Press, 2004.
[19] A. Gretton, K. Fukumizu, C. Teo, L. Song, B. Scholkopf, and A. Smola, "A Kernel Statistical Test of Independence," Advances in Neural Information Processing Systems, pp. 585592, MIT Press, 2007.
[20] S. Guo and X. Wu, "Deriving Private Information from Arbitrarily Projected Data," Proc. 11th PacificAsia Conf. Knowledge Discovery and Data Mining (PAKDD '07), May 2007.
[21] J.A. Halderman, S.D. Schoen, N. Heninger, W. Clarkson, W. Paul, J.A. Calandrino, A.J. Feldman, J. Appelbaum, and E.W. Felten, "Lest We Remember: Cold Boot Attacks on Encryption Keys," Proc. 17th USENIX Security Symp., pp. 4560, 2008.
[22] Z. Huang, W. Du, and B. Chen, "Deriving Private Information from Randomized Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 3748, 2005.
[23] A. Hyvärinen and E. Oja, "Independent Component Analysis: Algorithms and Applications," Neural Networks, vol. 13, pp. 411430, 2000.
[24] S. Jha, L. Kruger, and P. McDaniel, "Privacy Preserving Clustering," Proc. 10th European Symp. Research in Computer Security (ESORICS), pp. 397417, 2005.
[25] M. Kantarcioglu and C. Clifton, "PrivacyPreserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9, pp. 10261037, Sept. 2004.
[26] A. Kankainen and N. Ushakov, "A Consistent Modification of a Test for Independence Based on the Empirical Characteristic Function," J. Math. Sciences, vol. 89, no. 5, pp. 110, 1998.
[27] H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. Third IEEE Int'l Conf. Data Mining (ICDM '03), pp. 99106, 2003.
[28] S. Kotz, T.J. Kozubowski, and K. Podgórski, The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance. Birkhäuser, 2001.
[29] E. Lefons, A. Silvestri, and F. Tangorra, "An Analytic Approach to Statistical Databases," Proc. Ninth Int'l Conf. Very Large Data Bases (VLDB), 1983.
[30] N. Li, T. Li, and S. Venkatasubramanian, "TCloseness: Privacy Beyond KAnonymity and LDiversity," Proc. IEEE 23rd Int'l Conf. Data Eng. (ICDE '07), pp. 106115, 2007.
[31] C.K. Liew, U.J. Choi, and C.J. Liew, "A Data Distortion by Probability Distribution," ACM Trans. Database Systems, vol. 10, no. 3, pp. 395411, 1985.
[32] Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," Proc. Advances in Cryptology (CRYPTO '00), pp. 3654, 2000.
[33] K. Liu, H. Kargupta, and J. Ryan, "Random ProjectionBased Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 1, pp. 92106, Jan. 2006.
[34] K. Liu, C. Giannella, and H. Kargupta, "An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining," Proc. Principles of Data Mining and Knowledge Discovery (PKDD '06), pp. 297308, 2006.
[35] K. Liu, "Multiplicative Data Perturbation for Privacy Preserving Data Mining," PhD thesis, Univ. of Maryland, Jan. 2007.
[36] J. Löfberg, "YALMIP : A Toolbox for Modeling and Optimization in MATLAB," Proc. IEEE Int'l Symp. Computer Aided Control Systems Design, pp. 284289, Sept. 2004.
[37] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "LDiversity: Privacy Beyond KAnonymity," Proc. 22nd IEEE Int'l Conf. Data Eng. (ICDE '06), p. 24, 2006.
[38] K.V. Mardia, "Measures of Multivariate Skewness and Kurtosis with Applications," Biometrika, vol. 57, no. 3, pp. 519530, 1970.
[39] C.J. Mecklin and D.J. Mundfrom, "An Appraisal and Bibliography of Tests for Multivariate Normality," Int'l Statistical Rev., vol. 72, no. 1, pp. 123138, 2004.
[40] P.D. O'Grady, B.A. Pearlmutter, and S.T. Rickard, "Survey of Sparse and NonSparse Methods in Source Separation," Int'l J. Imaging Systems and Technology, vol. 15, no. 1, pp. 1833, 2005.
[41] S.R.M. Oliveira and O.R. Zaïane, "A PrivacyPreserving Clustering Approach Toward Secure and Effective Data Analysis for Business Collaboration," Computers and Security, vol. 26, no. 1, pp. 8193, 2007.
[42] K.B. Peterson and M.S. Pederson, "The Matrix Cookbook," Version:, http:/matrixcookbook.com/, Nov. 2008.
[43] S. Rizvi and J. Haritsa, "Maintaining Data Privacy in Association Rule Mining," Proc. 28th Int'l Conf. Very Large Databases (VLDB), Aug. 2002.
[44] Y. Sang, H. Shen, and H. Tian, "Reconstructing Data Perturbed by Random Projections when the Mixing Matrix Is Known," Proc. European Conf. Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), pp. 334349, Sept. 2009.
[45] Y. Sang, H. Shen, and H. Tian, "Privacy Preserving Tuple Matching in Distributed Database," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 12, pp. 17671782, Dec. 2009.
[46] Y. Sang and H. Shen, "Efficient and Secure Protocols for Privacy Preserving Set Operations," ACM Trans. Information and System Security, vol. 13, no. 1, 2009.
[47] Y. Saygin, V.S. Verykios, and C. Clifton, "Using Unknowns to Prevent Discovery of Association Rules," ACM SIGMOD Record, vol. 30, no. 4, pp. 4554, 2001.
[48] L. Sweeney, "KAnonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and KnowledgeBased Systems, vol. 10, no. 5, pp. 557570, 2002.
[49] F.J. Theis, E.W. Lang, and C.G. Puntonet, "A Geometric Algorithm for Overcomplete Linear ICA," Neurocomputing, vol. 56, pp. 381398, 2004.
[50] E.O. Turgay, T.B. Pedersen, Y. Saygin, E. Savas, and A. Levi, "Disclosure Risks of Distance Preserving Data Transformations," Proc. 20th Int'l Conf. Scientific and Statistical Database Management (SSDBM '08), pp. 7994, 2008.
[51] V. Verykios, A. Elmagarmid, B. Elisa, D. Elena, Y. Saygin, and E. Dasseni, "Association Rule Hiding," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 4, pp. 434447, Apr. 2004.
[52] Z. Yang, S. Zhong, and R.N. Wright, "PrivacyPreserving Classification of Customer Data without Loss of Accuracy," Proc. SIAM Int'l Conf. Data Mining (SDM), 2005.
[53] M. Zibulevsky and B.A. Pearlmutter, "Blind Source Separation by Sparse Decomposition in a Signal Dictionary," Neural Computation, vol. 13, no. 4, pp. 863882, 2001.