A Comparative Study of Data Perturbation Using Fuzzy Logic to Preserve Privacy
暂无分享,去创建一个
C. V. Guru Rao | Thanveer Jahan | G. Narasimha | G. Narasimha | C. V. Rao | Thanveer Jahan | T. Jahan | C. V. G. Rao
[1] Jie Wang,et al. Data Distortion for Privacy Protection in a Terrorist Analysis System , 2005, ISI.
[2] V. Valli Kumari,et al. Fuzzy based approach for privacy preserving publication of data , 2008 .
[3] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[4] T. Ross. Fuzzy Logic with Engineering Applications , 1994 .
[5] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[6] Sushil Jajodia,et al. A Privacy-Enhanced Microaggregation Method , 2002, FoIKS.
[7] Shuting Xu,et al. Fast Fourier Transform Based Data Perturbation Method for Privacy Protection , 2007, 2007 IEEE Intelligence and Security Informatics.
[8] Aryya Gangopadhyay,et al. A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms , 2006, The VLDB Journal.
[9] Rathindra Sarathy,et al. Data Shuffling - A New Masking Approach for Numerical Data , 2006, Manag. Sci..
[10] Josep Domingo-Ferrer,et al. Privacy in Data Mining , 2005, Data Mining and Knowledge Discovery.
[11] Timothy J. Ross,et al. Fuzzy Logic with Engineering Applications: Ross/Fuzzy Logic with Engineering Applications , 2010 .
[12] B. Karthikeyan,et al. A FUZZY BASED APPROACH FOR PRIVACY PRESERVING CLUSTERING , 2011 .
[13] Stephen E. Fienberg,et al. Data Swapping: Variations on a Theme by Dalenius and Reiss , 2004, Privacy in Statistical Databases.
[14] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[15] C. V. Guru Rao,et al. Data perturbation and feature selection in preserving privacy , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).