Securing Sensitive Data Information Through Multiplicative Perturbation Approach Based on UML Modeling
暂无分享,去创建一个
Deepak Arora | Upendra Kumar | Anurag | Anurag | Deepak Arora | U. Kumar
[1] Jie Wang,et al. Generalized random rotation perturbation for vertically partitioned data sets , 2009, 2009 IEEE Symposium on Computational Intelligence and Data Mining.
[2] Keke Chen,et al. A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.
[3] Keke Chen,et al. Under Consideration for Publication in Knowledge and Information Systems Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining , 2010 .
[4] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[5] Ivar Jacobson,et al. Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series) , 2005 .
[6] Mohammad Reza Keyvanpour,et al. Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification-based Framework , 2011, ArXiv.
[7] P Rajavadhana,et al. Data Privacy Preservation Using VariousPerturbation Techniques , 2015 .
[8] Pankaj Jalote,et al. An Integrated Approach to Software Engineering , 1997, Undergraduate Texts in Computer Science.