Upkeeping secrecy in information extraction using ‘k’ division graph based postulates
暂无分享,去创建一个
V. P. Arunachalam | S. Karthik | B. Santhosh Kumar | Dr B Santhosh Kumar Santhosh Balan | S. Karthik | V. Arunachalam
[1] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[2] Chris Clifton,et al. Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.
[3] Marisa W. Paryasto,et al. Big-data security management issues , 2014, 2014 2nd International Conference on Information and Communication Technology (ICoICT).
[4] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[5] S. Smys,et al. Construction of virtual backbone to support mobility in MANET — A less overhead approach , 2009, 2009 International Conference on Application of Information and Communication Technologies.
[6] J. Ross Quinlan,et al. Induction of Decision Trees , 1986, Machine Learning.
[7] Neal Koblitz,et al. a course in number theory , 1987 .
[8] Zhengxin Chen,et al. Privacy-Preserving Data Mining of Medical Data Using Data Separation-Based Techniques , 2007, Data Sci. J..
[9] Jung Tae Kim. Privacy and Security Issues for Healthcare System with Embedded RFID System on Internet of Things , 2014 .
[10] Pingshui Wang. Survey on Privacy Preserving Data Mining , 2010 .
[11] Chunxiao Jiang,et al. Information Security in Big Data: Privacy and Data Mining , 2014, IEEE Access.
[12] Animesh Tripathy,et al. A novel framework for preserving privacy of data using correlation analysis , 2012, ICACCI '12.
[13] Bhavana Abad,et al. A Novel approach for Privacy Preserving in Medical Data Mining using Sensitivity based anonymity , 2012 .