Privacy Preserving Through Fireworks Algorithm Based Model for Image Perturbation in Big Data
暂无分享,去创建一个
Reda Mohamed Hamou | Abdelmalek Amine | Mohamed Rahmani | Amine Rahmani | Hadj Ahmed Bouarara | Abdelmalek Amine | R. M. Hamou | Amine Rahmani | M. Rahmani
[1] Neha Gupta,et al. Preserving Privacy Using Data Perturbation in Data Stream , 2013 .
[2] Tamir Tassa,et al. Identity obfuscation in graphs through the information theoretic lens , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[3] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[4] Kato Mivule,et al. Utilizing Noise Addition for Data Privacy, an Overview , 2013, ArXiv.
[5] Li Liu,et al. The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..
[6] Yadong Wang,et al. A Privacy-Preserving Classification Method Based on Singular Value Decomposition , 2012, Int. Arab J. Inf. Technol..
[7] Mohammad Reza Keyvanpour,et al. Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework , 2011, ArXiv.
[8] Helena Ramalhinho Dias Lourenço,et al. Iterated Local Search , 2001, Handbook of Metaheuristics.
[9] Ying Tan,et al. Iterative improvement of the Multiplicative Update NMF algorithm using nature-inspired optimization , 2011, 2011 Seventh International Conference on Natural Computation.
[10] Aryya Gangopadhyay,et al. A generic and distributed privacy preserving classification method with a worst-case privacy guarantee , 2013, Distributed and Parallel Databases.
[11] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[12] Ying Tan,et al. Fireworks algorithm with differential mutation for solving the CEC 2014 competition problems , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).
[13] Asem Mohammad Al-Najjar,et al. Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table , 2011 .
[14] Jianhua Liu,et al. The Improvement on Controlling Exploration and Exploitation of Firework Algorithm , 2013, ICSI.
[15] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[16] Ke Ding,et al. Introduction to Fireworks Algorithm , 2013, Int. J. Swarm Intell. Res..
[17] Ying Tan,et al. Adaptive Fireworks Algorithm , 2014 .
[18] Sachin Deshpande,et al. Preserving Privacy in Data Mining using Data Distortion Approach , 2016 .
[19] Ying Tan,et al. Dynamic search in fireworks algorithm , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).
[20] Haibin Zhu,et al. Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms , 2011, Expert Syst. Appl..
[21] Rathindra Sarathy,et al. A theoretical basis for perturbation methods , 2003, Stat. Comput..
[22] Jianhua Liu,et al. Analysis on global convergence and time complexity of fireworks algorithm , 2014, 2014 IEEE Congress on Evolutionary Computation (CEC).
[23] Thomas Stützle,et al. Iterated local search for the quadratic assignment problem , 2006, Eur. J. Oper. Res..
[24] Mariko Okada,et al. Multiple Perturbation Two-Dimensional Correlation Analysis of Cellulose by Attenuated Total Reflection Infrared Spectroscopy , 2009, Applied spectroscopy.
[25] F.L. Teixeira,et al. On the Sensitivity of Time-Reversal Imaging Techniques to Model Perturbations , 2008, IEEE Transactions on Antennas and Propagation.
[26] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[27] Ralph Gross,et al. Face De-identification , 2009, Protecting Privacy in Video Surveillance.
[28] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.
[29] Sos S. Agaian,et al. A symmetric image cipher using wave perturbations , 2014, Signal Process..
[30] Hitesh Gupta,et al. RECONSTRUCTION OF PERTURBED DATA USING K-MEANS , 2012 .
[31] Jie Ling,et al. A fast image encryption method by using chaotic 3D cat maps , 2014 .
[32] Ralph Gross,et al. Model-Based Face De-Identification , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[33] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[34] Peter G. M. van der Heijden,et al. Meta-Analysis of Randomized Response Research , 2005 .
[35] Unil Yun,et al. A fast perturbation algorithm using tree structure for privacy preserving utility mining , 2015, Expert Syst. Appl..
[36] Ying Tan,et al. Fireworks Algorithm for Optimization , 2010, ICSI.
[37] Xilin Shen,et al. Perturbation of the Eigenvectors of the Graph Laplacian: Application to Image Denoising , 2012, ArXiv.
[38] Bradley Malin,et al. Preserving privacy by de-identifying face images , 2005, IEEE Transactions on Knowledge and Data Engineering.
[39] Kamil Rocki,et al. Large scale parallel iterated local search algorithm for solving traveling salesman problem , 2012, HiPC 2012.
[40] Ying Tan,et al. Enhanced Fireworks Algorithm , 2013, CEC 2013.
[41] Feng Li,et al. Distributed anonymous data perturbation method for privacy-preserving data mining , 2009 .
[42] Ying Tan,et al. An empirical study on influence of approximation approaches on enhancing fireworks algorithm , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[43] Xiaojun Tong,et al. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..
[44] Emmanuel J. Candès,et al. The curvelet transform for image denoising , 2002, IEEE Trans. Image Process..
[45] J. L. Maryak,et al. Simultaneous perturbation optimization for efficient image restoration , 2005, IEEE Transactions on Aerospace and Electronic Systems.
[46] Patrick P. K. Chan,et al. Blind steganalysis with high generalization capability for different image databases using L-GEM , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[47] Haibin Ling,et al. Preservative License Plate De-identification for Privacy Protection , 2011, 2011 International Conference on Document Analysis and Recognition.
[48] Keke Chen,et al. Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .
[49] Hai Yu,et al. Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains , 2015 .
[50] Ohbyung Kwon,et al. A privacy-aware feature selection method for solving the personalization-privacy paradox in mobile wellness healthcare services , 2015, Expert Syst. Appl..
[51] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).