Rotation Perturbation Techniques in Privacy Preserving Data Mining with clustering Approach
暂无分享,去创建一个
[1] Le Jiajin,et al. Survey of Anonymity Techniques for Privacy Preserving , 2011 .
[2] M. B. Malik,et al. Privacy Preserving Data Mining Techniques: Current Scenario and Future Prospects , 2012, 2012 Third International Conference on Computer and Communication Technology.
[3] Pingshui Wang. A Survey on Privacy Preserving Data Mining , 2009, 2009 First International Workshop on Database Technology and Applications.
[4] Xun Yi,et al. Classification of Privacy-preserving Distributed Data Mining protocols , 2011, 2011 Sixth International Conference on Digital Information Management.
[5] Mohammad Reza Keyvanpour,et al. Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework , 2011, ArXiv.
[6] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[7] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[8] Haisheng Li. Study of Privacy Preserving Data Mining , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[9] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[10] Jian Wang,et al. A Survey on Anonymity-Based Privacy Preserving , 2009, 2009 International Conference on E-Business and Information System Security.