Search the dblp DataBase
Jaideep Vaidya :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jaideep Vaidya , Vijayalakshmi Atluri , Janice Warner RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf ] Jaideep Vaidya , Chris Clifton Privacy-Preserving Decision Trees over Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:139-152 [Conf ] Chris Clifton , Murat Kantarcioglu , AnHai Doan , Gunther Schadow , Jaideep Vaidya , Ahmed K. Elmagarmid , Dan Suciu Privacy-preserving data integration and sharing. [Citation Graph (0, 0)][DBLP ] DMKD, 2004, pp:19-26 [Conf ] Wei Jiang , Jaideep Vaidya , Zahir Balaporia , Chris Clifton , Brett Banich Knowledge Discovery from Transportation Network Data. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:1061-1072 [Conf ] Jaideep Vaidya , Chris Clifton Privacy-Preserving Top-K Queries. [Citation Graph (0, 0)][DBLP ] ICDE, 2005, pp:545-546 [Conf ] Jaideep Vaidya , Chris Clifton Privacy-Preserving Outlier Detection. [Citation Graph (0, 0)][DBLP ] ICDM, 2004, pp:233-240 [Conf ] Vandana Pursnani Janeja , Vijayalakshmi Atluri , Jaideep Vaidya , Nabil R. Adam Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP ] ISI, 2005, pp:1-13 [Conf ] Jaideep Vaidya , Chris Clifton Privacy preserving association rule mining in vertically partitioned data. [Citation Graph (0, 0)][DBLP ] KDD, 2002, pp:639-644 [Conf ] Jaideep Vaidya , Chris Clifton Privacy-preserving k -means clustering over vertically partitioned data. [Citation Graph (0, 0)][DBLP ] KDD, 2003, pp:206-215 [Conf ] Hwanjo Yu , Jaideep Vaidya , Xiaoqian Jiang Privacy-Preserving SVM Classification on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP ] PAKDD, 2006, pp:647-656 [Conf ] Hwanjo Yu , Xiaoqian Jiang , Jaideep Vaidya Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:603-610 [Conf ] Jaideep Vaidya , Chris Clifton Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP ] SDM, 2004, pp:- [Conf ] Jaideep Vaidya , Chris Clifton Leveraging the "Multi" in secure multi-party computation. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:53-59 [Conf ] Jaideep Vaidya , Chris Clifton Privacy-Preserving Data Mining: Why, How, and When. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:19-27 [Journal ] Jaideep Vaidya , Chris Clifton Secure set intersection cardinality with application to association rule mining. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:4, pp:593-622 [Journal ] Chris Clifton , Murat Kantarcioglu , Jaideep Vaidya , Xiaodong Lin , Michael Y. Zhu Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal ] Jaideep Vaidya , Vijayalakshmi Atluri , Qi Guo The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:175-184 [Conf ] Janice Warner , Vijayalakshmi Atluri , Ravi Mukkamala , Jaideep Vaidya Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:235-244 [Conf ] Jaideep Vaidya , Murat Kantarcioglu , Chris Clifton Privacy-preserving Naïve Bayes classification. [Citation Graph (0, 0)][DBLP ] VLDB J., 2008, v:0, n:, pp:- [Journal ] The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP ] A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming. [Citation Graph (, )][DBLP ] Effective anonymization of query logs. [Citation Graph (, )][DBLP ] Secure Construction of Contingency Tables from Distributed Data. [Citation Graph (, )][DBLP ] Role Mining in the Presence of Noise. [Citation Graph (, )][DBLP ] Secure information sharing and analysis for effective emergency management. [Citation Graph (, )][DBLP ] UICDS compliant resource management system for emergency response. [Citation Graph (, )][DBLP ] An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP ] Optimal Boolean Matrix Decomposition: Application to Role Engineering. [Citation Graph (, )][DBLP ] Extended Boolean Matrix Decomposition. [Citation Graph (, )][DBLP ] Enabling Better Medical Image Classification Through Secure Collaboration. [Citation Graph (, )][DBLP ] A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. [Citation Graph (, )][DBLP ] Ensuring Privacy and Security for LBS through Trajectory Partitioning. [Citation Graph (, )][DBLP ] An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining. [Citation Graph (, )][DBLP ] Efficient Privacy-Preserving Link Discovery. [Citation Graph (, )][DBLP ] Privacy-preserving link discovery. [Citation Graph (, )][DBLP ] Privacy-preserving linear programming. [Citation Graph (, )][DBLP ] Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP ] Privacy-preserving trust verification. [Citation Graph (, )][DBLP ] Preserving Privacy in Social Networks: A Structure-Aware Approach. [Citation Graph (, )][DBLP ] Anonymization models for directional location based service environments. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.304secs