[PDF][PDF] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation.
B Murugeshwari, S Rajalakshmi… - … Systems Science & …, 2023 - cdn.techscience.cn
Imagine numerous clients, each with personal data; individual inputs are severely corrupt,
and a server only concerns the collective, statistically essential facets of this data. In several …
and a server only concerns the collective, statistically essential facets of this data. In several …
[PDF][PDF] Performance analysis of perturbation-based privacy preserving techniques: an experimental perspective.
Nowadays, enormous amounts of data are produced every second. These data also contain
private information from sources including media platforms, the banking sector, finance …
private information from sources including media platforms, the banking sector, finance …
CHAINS: CHAIN-Based Fusion Safety System Framework for Intelligent Connected Vehicle
S Yang, B Sun, H Guang, R Wang, B Zheng, W Gong… - CHAIN, 2024 - ieeexplore.ieee.org
Intelligent connected vehicles, as the focus of the global automotive industry, are currently at
a critical stage of large-scale commercialization. However, during the development process …
a critical stage of large-scale commercialization. However, during the development process …
[PDF][PDF] A STUDY ON PRIVACY PRESERVING BIG DATA MINING: TECHNIQUES AND CHALLENGES
KM Kharkhoda - International Journal of Advanced Research in …, 2022 - academia.edu
The basic goal of data mining algorithms is to extract previously undiscovered patterns from
the data. When mining the data, sensitive and confidential information should be secured …
the data. When mining the data, sensitive and confidential information should be secured …