ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Stronger data poisoning attacks break data sanitization defenses
Machine Learning
◽
10.1007/s10994-021-06119-y
◽
2021
◽
Author(s):
Pang Wei Koh
◽
Jacob Steinhardt
◽
Percy Liang
Keyword(s):
Data Sanitization
Download Full-text
Related Documents
Cited By
References
Impact factor based data sanitization in association rule mining
Materials Today Proceedings
◽
10.1016/j.matpr.2020.11.517
◽
2021
◽
Author(s):
S. Nithya
◽
M. Sangeetha
◽
K.N. Apinaya Prethi
◽
S. Vellingiri
Keyword(s):
Impact Factor
◽
Association Rule
◽
Association Rule Mining
◽
Rule Mining
◽
Data Sanitization
Download Full-text
Data sanitization against adversarial label contamination based on data complexity
International Journal of Machine Learning and Cybernetics
◽
10.1007/s13042-016-0629-5
◽
2017
◽
Vol 9
(6)
◽
pp. 1039-1052
◽
Cited By ~ 8
Author(s):
Patrick P. K. Chan
◽
Zhi-Min He
◽
Hongjiang Li
◽
Chien-Chang Hsu
Keyword(s):
Data Complexity
◽
Data Sanitization
Download Full-text
Dare to share: Protecting sensitive knowledge with data sanitization
Decision Support Systems
◽
10.1016/j.dss.2006.08.007
◽
2007
◽
Vol 43
(1)
◽
pp. 181-191
◽
Cited By ~ 72
Author(s):
Ali Amiri
Keyword(s):
Data Sanitization
◽
Sensitive Knowledge
Download Full-text
Data Sanitization Framework for Computer Hard Disk Drive: A Case Study in Malaysia
International Journal of Advanced Computer Science and Applications
◽
10.14569/ijacsa.2019.0101155
◽
2019
◽
Vol 10
(11)
◽
Author(s):
Nooreen Ashilla Binti Yusof
◽
Siti Norul
◽
Mohamad Firham
◽
Nor Zarina
◽
Monaliza Binti
Keyword(s):
Hard Disk Drive
◽
Hard Disk
◽
Disk Drive
◽
Data Sanitization
Download Full-text
Faculty Opinions recommendation of Data Sanitization to Reduce Private Information Leakage from Functional Genomics.
Faculty Opinions – Post-Publication Peer Review of the Biomedical Literature
◽
10.3410/f.739023626.793582533
◽
2021
◽
Author(s):
Kevin Yip
Keyword(s):
Functional Genomics
◽
Private Information
◽
Information Leakage
◽
Data Sanitization
Download Full-text
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems
10.1109/milcom52596.2021.9652916
◽
2021
◽
Author(s):
Sridhar Venkatesan
◽
Harshvardhan Sikka
◽
Rauf Izmailov
◽
Ritu Chadha
◽
Alina Oprea
◽
...
Keyword(s):
Machine Learning
◽
Intrusion Detection
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Learning Models
◽
Detection Systems
◽
Data Sanitization
◽
Network Intrusion
◽
Network Intrusion Detection Systems
◽
Machine Learning Models
Download Full-text
Data Sanitization to Reduce Private Information Leakage from Functional Genomics
Cell
◽
10.1016/j.cell.2020.09.036
◽
2020
◽
Vol 183
(4)
◽
pp. 905-917.e16
Author(s):
Gamze Gürsoy
◽
Prashant Emani
◽
Charlotte M. Brannon
◽
Otto A. Jolanki
◽
Arif Harmanci
◽
...
Keyword(s):
Functional Genomics
◽
Private Information
◽
Information Leakage
◽
Data Sanitization
Download Full-text
A Heuristic Data-Sanitization Approach Based on TF-IDF
Lecture Notes in Computer Science - Modern Approaches in Applied Intelligence
◽
10.1007/978-3-642-21822-4_17
◽
2011
◽
pp. 156-164
◽
Cited By ~ 5
Author(s):
Tzung-Pei Hong
◽
Chun-Wei Lin
◽
Kuo-Tung Yang
◽
Shyue-Liang Wang
Keyword(s):
Data Sanitization
Download Full-text
An Information-Theoretic Approach to Individual Sequential Data Sanitization
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining - WSDM '16
◽
10.1145/2835776.2835828
◽
2016
◽
Cited By ~ 2
Author(s):
Luca Bonomi
◽
Liyue Fan
◽
Hongxia Jin
Keyword(s):
Sequential Data
◽
Theoretic Approach
◽
Information Theoretic
◽
Data Sanitization
◽
Information Theoretic Approach
Download Full-text
Data sanitization for privacy preservation on Social Network
2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT)
◽
10.1109/icacdot.2016.7877732
◽
2016
◽
Cited By ~ 1
Author(s):
Prajakta Tambe
◽
Deepali Vora
Keyword(s):
Social Network
◽
Privacy Preservation
◽
Data Sanitization
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close