Implementation of Multi-Level Trust in Privacy Preserving Data Mining against Non-Linear Attack (original) (raw)

12 | Page Multilevel Privacy Preserving by Linear and Non Linear Data Distortion 1

IOSR Journals

View PDFchevron_right

Enhanced Batch Generation based Multilevel Trust Privacy Preserving in Data Mining

B Hanmanthu

International Journal of Computer Applications, 2013

View PDFchevron_right

A Technique to improve Security of Data in Multilevel Trust

Viji Mary

2014

View PDFchevron_right

Enabling multi-level trust in privacy preserving data mining

wayne zhang

2008

View PDFchevron_right

A Novel Approach to Preserve the Privacy of Data

Viji Mary

2014

View PDFchevron_right

Preserving Privacy in Data Mining by Data Perturbation Technique

Hitesh Reddy

View PDFchevron_right

A Review on Various Privacy Preserving Techniuqes & Classifications Algorithms

Anurag Jain

2014

View PDFchevron_right

of Additive and Multiplicative Data Perturbation for Privacy Preserving Data Mining

Keerti Dixit

2016

View PDFchevron_right

IJERT-An Enhanced Approach to Privacy-Preserving in Data Mining and its Techniques

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2015

View PDFchevron_right

DATA PERTURBATION FOR PRIVACY PRESERVATION IN DATA MINING

IAEME Publication

IAEME Publications, 2018

View PDFchevron_right

A Survey on Data Perturbation Techniques for Privacy Preserving in Data Mining

IJSRD - International Journal for Scientific Research and Development

View PDFchevron_right

Random Rotation Based Data Perturbation Technique For Privacy Preserving Data Mining

gargi shah

2014

View PDFchevron_right

An Enhanced Approach for Privacy Preserving Data Mining (PPDM)

Swapna Siddamsetti

International Journal of Recent Trends in Engineering and Research, 2018

View PDFchevron_right

Comparative Study on Perturbation Techniques in Privacy Preserving Data Mining on Two Numeric Datasets

Siti Hajar Othman

International Journal of Innovative Computing, 2018

View PDFchevron_right

Survey on Recent Algorithms for Privacy Preserving Data mining

Selva Rathna

2015

View PDFchevron_right

A Robust Privacy Preservation by Combination of Additive and Multiplicative Data Perturbation for Privacy Preserving Data Mining

Bhupendra Pandya

International Journal of Computer Applications, 2015

View PDFchevron_right

Study and Analysis of Privacy Preserving Data Mining Techniques in Current Scenario

Sujeet Tiwari

International journal of engineering research and technology, 2018

View PDFchevron_right

HiMod-Pert: Histogram Modification Based Perturbation Approach for Privacy Preserving Data Mining

Dr. Ravi Gulati

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2018

View PDFchevron_right

Remodeling: improved privacy preserving data mining (PPDM)

Anala Pandit

International journal of information technology, 2020

View PDFchevron_right

Privacy Preservation in Data Mining by Using Normalization and Transformation Technique

Sujeet Tiwari

2016

View PDFchevron_right

An Enhanced Approach to Privacy-Preserving in Data Mining and its Techniques

harshali patil

2015

View PDFchevron_right

Heuristic Based Approach for Privacy Preserving in Data Mining

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

View PDFchevron_right

Data Restoration and Privacy Preserving of Data Mining Using Random Decision Tree Over Vertically Partitioned Data

International Journal Of engineering and Computer Science (IJECS)

View PDFchevron_right

A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining

keke chen

View PDFchevron_right

Data Privacy Preserving using Perturbation Technique

Vishwanath Mahalle

Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 2017

View PDFchevron_right

Multilevel Privacy Preserving in Distributed Environment using Cryptographic Technique

Fuad Al-Yarimi

View PDFchevron_right

A Case Study on Issues In Privacy Preserving Data Mining

SIRIPURI KIRAN

View PDFchevron_right

A Review on Security Techniques for Privacy-Preserving in Data Mining

International Journal of Scientific Research in Computer Science, Engineering and Information Technology IJSRCSEIT

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2019

View PDFchevron_right

Third Party Privacy Preserving Protocol for Perturbation Based Classification of Vertically Fragmented Data Bases

B Hanmanthu

ArXiv, 2013

View PDFchevron_right

A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining

mohommad ali Kadampur

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 1, JANUARY 2010, ISSN 2151-9617, 2010

View PDFchevron_right

Comparative study on perturbation techniques in privacy preserving data mining

Desmond Ko

Penerbit UTM Press, 2018

View PDFchevron_right

Safeguarding the Privacy Preservation of Data in Data mining: A Survey

IJIRST - International Journal for Innovative Research in Science and Technology

View PDFchevron_right

To enhance Security Approach for High Dimension Collaborative Data

Finlogy Publication

View PDFchevron_right