A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms (original) (raw)

A fuzzy programming approach for data reduction and privacy in distance-based mining

Aryya Gangopadhyay

International Journal of Information and Computer Security, 2008

View PDFchevron_right

DISTANCE BASED TRANSFORMATION FOR PRIVACY PRESERVING DATA MINING USING HYBRID TRANSFORMATION

Anji Jalla, Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

A Novel approach for Preserving Data Privacy in Data Mining

divya rathod

2017

View PDFchevron_right

A privacy-preserving clustering approach toward secure and effective data analysis for business collaboration

Osmar R. Zaiane

Computers & Security, 2007

View PDFchevron_right

A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining

keke chen

View PDFchevron_right

Privacy Preserving Data Mining: Applications, Challenges and Future Trends

Jaydip Sen

View PDFchevron_right

FRAPP: a framework for high-accuracy privacy-preserving mining

Aditya Prakash

Data Mining and Knowledge Discovery, 2009

View PDFchevron_right

A Survey on Data Perturbation Techniques for Privacy Preserving in Data Mining

IJSRD - International Journal for Scientific Research and Development

View PDFchevron_right

Privacy preserving data mining with 3-D rotation transformation

Somya Upadhyay

Journal of King Saud University - Computer and Information Sciences, 2016

View PDFchevron_right

A privacy preserving technique for distance-based classification with worst case privacy guarantees

Aryya Gangopadhyay

Data & Knowledge Engineering, 2008

View PDFchevron_right

Privacy-Preserving Classification and Clustering Using Secure Multi-Party Computation

Saeed Samet

Proceeding of The International Conference on …

View PDFchevron_right

IJERT-An Enhanced Approach to Privacy-Preserving in Data Mining and its Techniques

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2015

View PDFchevron_right

Random-data perturbation techniques and privacy-preserving data mining

Nagarjuna Agrapu

Knowledge and Information Systems, 2005

View PDFchevron_right

An overview of privacy preserving data mining

Aris Gkoulalas-divanis

Crossroads, 2009

View PDFchevron_right

Privacy Preserving Data Mining: A Comprehensive Survey

Ankita Mandowara

International Journal of Computer Applications, 2017

View PDFchevron_right

of Additive and Multiplicative Data Perturbation for Privacy Preserving Data Mining

Keerti Dixit

2016

View PDFchevron_right

AN EFFICIENT SECURE COMPUTATION FOR PRIVACY PRESERVING DATA MINING IN MULTI PARTY COMPUTATION (MPC) – A REVIEW

IAEME Publication

IAEME PUBLICATION, 2020

View PDFchevron_right

A survey on privacy preserving data mining

faustin uwizeyimana

… International Workshop on Database …, 2009

View PDFchevron_right

Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification

Zhiyuan Chen

International Journal of Information Security and Privacy, 2012

View PDFchevron_right

CBTS: Correlation based transformation strategy for privacy preserving data mining

N P NETHRAVATHI

2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2015

View PDFchevron_right

Privacy preserving clustering on horizontally partitioned data

volkan kaya

Data & Knowledge Engineering, 2007

View PDFchevron_right

An Efficient Approach of Privacy Preserving Data Mining

Manish Sharma

View PDFchevron_right

Random Rotation Based Data Perturbation Technique For Privacy Preserving Data Mining

gargi shah

2014

View PDFchevron_right

Privacy-Preserving Data Mining in Homogeneous Collaborative Clustering

Sameh Salem

View PDFchevron_right

Generic CBTS: Correlation based Transformation Strategy for Privacy Preserving Data Mining

N P NETHRAVATHI

International Journal of Computer Applications, 2017

View PDFchevron_right

Privacy Preserved Collaborative Secure Multiparty Data Mining

Balamurugan M

View PDFchevron_right

HiMod-Pert: Histogram Modification Based Perturbation Approach for Privacy Preserving Data Mining

Dr. Ravi Gulati

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018

View PDFchevron_right

Safeguarding the Privacy Preservation of Data in Data mining: A Survey

IJIRST - International Journal for Innovative Research in Science and Technology

View PDFchevron_right

An Enhanced Approach to Privacy-Preserving in Data Mining and its Techniques

harshali patil

2015

View PDFchevron_right

Privacy preserving clustering by data transformation

Osmar R. Zaiane

Proc. of the 18th Brazilian Symposium on …, 2003

View PDFchevron_right

Privacy-Preserving and K-Nearest Means Clustering over Relational Data

IRJET Journal

View PDFchevron_right

Practical Privacy-Preserving Data Mining

Alina Campan

2008

View PDFchevron_right

Practical private computation and zero-knowledge tools for privacy-preserving distributed data mining

John Canny

2008

View PDFchevron_right

PREPROCESSING AND SECURE COMPUTATIONS FOR PRIVACY PRESERVATION DATA MINING

iaeme iaeme

View PDFchevron_right