[PDF][PDF] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation.

B Murugeshwari, S Rajalakshmi… - … Systems Science & …, 2023 - cdn.techscience.cn
Imagine numerous clients, each with personal data; individual inputs are severely corrupt,
and a server only concerns the collective, statistically essential facets of this data. In several …

[PDF][PDF] Performance analysis of perturbation-based privacy preserving techniques: an experimental perspective.

R Ratra, P Gulia, NS Gill - International Journal of Electrical & …, 2023 - researchgate.net
Nowadays, enormous amounts of data are produced every second. These data also contain
private information from sources including media platforms, the banking sector, finance …

CHAINS: CHAIN-Based Fusion Safety System Framework for Intelligent Connected Vehicle

S Yang, B Sun, H Guang, R Wang, B Zheng, W Gong… - CHAIN, 2024 - ieeexplore.ieee.org
Intelligent connected vehicles, as the focus of the global automotive industry, are currently at
a critical stage of large-scale commercialization. However, during the development process …

[PDF][PDF] A STUDY ON PRIVACY PRESERVING BIG DATA MINING: TECHNIQUES AND CHALLENGES

KM Kharkhoda - International Journal of Advanced Research in …, 2022 - academia.edu
The basic goal of data mining algorithms is to extract previously undiscovered patterns from
the data. When mining the data, sensitive and confidential information should be secured …