Abstract
I like to say that I backed into data mining. I come from the database community, although with a dissertation in database support for hypertext (while at Princeton University) I have never really been a “core database” researcher. With years (Bachelor’s and Master’s) at M.I.T., I had also had more machine learning than most. This leads to my first real “data-mining” work (although it was not called that at the time): applying machine learning techniques to a problem in heterogeneous databases. Schema integration, or more specifically schema element matching, has all of the hallmarks we see in good knowledge discovery problems:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
C. Clifton, Change detection in overhead imagery using neural networks. Int. J. Appl. Intell. 18(2), 215–234 (2003). http://www.kluweronline.com/issn/0924-669X
C. Clifton, R. Cooley, J. Rennie, TopCat: data mining for topic identification in a text corpus. IEEE Trans. Knowl. Data Eng. 16(8), 949–964 (2004). http://csdl.computer.org/comp/trans/tk/2004/08/k0949abs.htm
C. Clifton, D. Marks, Security and privacy implications of data mining, in Workshop on Data Mining and Knowledge Discovery (ACM SIGMOD, Montreal, Canada, Jun 1996), pp. 15–19, http://www.cs.purdue.edu/homes/clifton/cv/pubs/dmkd.pdf
W. Jiang, C. Clifton, AC-framework for privacy-preserving collaboration, in SIAM International Conference on Data Mining, Minneapolis, MN, 26–28 Apr 2007, http://www.siam.org/proceedings/datamining/2007/dm07_005wjiang.pdf
W.S. Li, C. Clifton, SEMINT: a tool for identifying attribute correspondences in heterogeneous databases using neural networks. Data Knowl. Eng. 33(1), 49–84 (2000). http://dx.doi.org/10.1016/S0169-023X(99)00044-0
M. Murugesan, C. Clifton, Providing privacy through plausibly deniable search, in 2009 SIAM International Conference on Data Mining, Sparks, NV, 30 Apr–2 May 2009, http://www.siam.org/proceedings/datamining/2009/dm09_070_murugesanm.pdf
M.E. Nergiz, C. Clifton, Thoughts on k-anonymization. Data Knowl. Eng. 63(3), 622–645 (2007). http://dx.doi.org/10.1016/j.datak.2007.03.009
Topic detection and tracking project TDT (25 Sep 2000), http://www.nist.gov/speech/tests/tdt/index.htm
J. Vaidya, C. Clifton, M. Zhu, Privacy Preserving Data Mining. Advances in Information Security, vol. 19 (Springer, New York, 2006). http://www.springeronline.com/sgw/cda/frontpage/0,11855,4-40356-72-52496494-0,00.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Clifton, C. (2012). Discovering Privacy. In: Gaber, M. (eds) Journeys to Data Mining. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28047-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-28047-4_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28046-7
Online ISBN: 978-3-642-28047-4
eBook Packages: Computer ScienceComputer Science (R0)