The SCEAS System
Navigation Menu

Search the dblp DataBase


Jaideep Vaidya: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
    RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf]
  2. Jaideep Vaidya, Chris Clifton
    Privacy-Preserving Decision Trees over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:139-152 [Conf]
  3. Chris Clifton, Murat Kantarcioglu, AnHai Doan, Gunther Schadow, Jaideep Vaidya, Ahmed K. Elmagarmid, Dan Suciu
    Privacy-preserving data integration and sharing. [Citation Graph (0, 0)][DBLP]
    DMKD, 2004, pp:19-26 [Conf]
  4. Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton, Brett Banich
    Knowledge Discovery from Transportation Network Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:1061-1072 [Conf]
  5. Jaideep Vaidya, Chris Clifton
    Privacy-Preserving Top-K Queries. [Citation Graph (0, 0)][DBLP]
    ICDE, 2005, pp:545-546 [Conf]
  6. Jaideep Vaidya, Chris Clifton
    Privacy-Preserving Outlier Detection. [Citation Graph (0, 0)][DBLP]
    ICDM, 2004, pp:233-240 [Conf]
  7. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
    Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:1-13 [Conf]
  8. Jaideep Vaidya, Chris Clifton
    Privacy preserving association rule mining in vertically partitioned data. [Citation Graph (0, 0)][DBLP]
    KDD, 2002, pp:639-644 [Conf]
  9. Jaideep Vaidya, Chris Clifton
    Privacy-preserving k-means clustering over vertically partitioned data. [Citation Graph (0, 0)][DBLP]
    KDD, 2003, pp:206-215 [Conf]
  10. Hwanjo Yu, Jaideep Vaidya, Xiaoqian Jiang
    Privacy-Preserving SVM Classification on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2006, pp:647-656 [Conf]
  11. Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
    Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:603-610 [Conf]
  12. Jaideep Vaidya, Chris Clifton
    Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    SDM, 2004, pp:- [Conf]
  13. Jaideep Vaidya, Chris Clifton
    Leveraging the "Multi" in secure multi-party computation. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:53-59 [Conf]
  14. Jaideep Vaidya, Chris Clifton
    Privacy-Preserving Data Mining: Why, How, and When. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:19-27 [Journal]
  15. Jaideep Vaidya, Chris Clifton
    Secure set intersection cardinality with application to association rule mining. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:4, pp:593-622 [Journal]
  16. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu
    Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal]
  17. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
    The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:175-184 [Conf]
  18. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
    Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:235-244 [Conf]
  19. Jaideep Vaidya, Murat Kantarcioglu, Chris Clifton
    Privacy-preserving Naïve Bayes classification. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  20. The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP]

  21. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. [Citation Graph (, )][DBLP]

  22. Effective anonymization of query logs. [Citation Graph (, )][DBLP]

  23. Secure Construction of Contingency Tables from Distributed Data. [Citation Graph (, )][DBLP]

  24. Role Mining in the Presence of Noise. [Citation Graph (, )][DBLP]

  25. Secure information sharing and analysis for effective emergency management. [Citation Graph (, )][DBLP]

  26. UICDS compliant resource management system for emergency response. [Citation Graph (, )][DBLP]

  27. An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP]

  28. Optimal Boolean Matrix Decomposition: Application to Role Engineering. [Citation Graph (, )][DBLP]

  29. Extended Boolean Matrix Decomposition. [Citation Graph (, )][DBLP]

  30. Enabling Better Medical Image Classification Through Secure Collaboration. [Citation Graph (, )][DBLP]

  31. A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. [Citation Graph (, )][DBLP]

  32. Ensuring Privacy and Security for LBS through Trajectory Partitioning. [Citation Graph (, )][DBLP]

  33. An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining. [Citation Graph (, )][DBLP]

  34. Efficient Privacy-Preserving Link Discovery. [Citation Graph (, )][DBLP]

  35. Privacy-preserving link discovery. [Citation Graph (, )][DBLP]

  36. Privacy-preserving linear programming. [Citation Graph (, )][DBLP]

  37. Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP]

  38. Privacy-preserving trust verification. [Citation Graph (, )][DBLP]

  39. Preserving Privacy in Social Networks: A Structure-Aware Approach. [Citation Graph (, )][DBLP]

  40. Anonymization models for directional location based service environments. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002