[PDF][PDF] Privacy preserving data mining: techniques, classification and implications-a survey
A Shah, R Gulati - Int. J. Comput. Appl, 2016 - academia.edu
Privacy has become crucial in knowledge based applications. Proper integration of
individual privacy is essential for data mining operations. This privacy based data mining is …
individual privacy is essential for data mining operations. This privacy based data mining is …
Privacy preserving in data mining using hybrid approach
Data sharing between two organizations is common in many application areas like business
planning or marketing. When data are to be shared between parties, there could be some …
planning or marketing. When data are to be shared between parties, there could be some …
An efficient approach for privacy preserving in data mining
In many organizations large amount of data are collected. These data are sometimes used
by the organizations for data mining tasks. However, the data collected may contain private …
by the organizations for data mining tasks. However, the data collected may contain private …
Disclosure risk of individuals: a k-anonymity study on health care data related to Indian population
JJ Panackal, AS Pillai… - … Conference on Data …, 2014 - ieeexplore.ieee.org
Many private organizations are reluctant to share the health related information to the
researchers fearing loss of privacy of data. The non availability of data has potential …
researchers fearing loss of privacy of data. The non availability of data has potential …
Applying data mining techniques to standardized electronic health records for decision support
S Batra, HJ Parashar, S Sachdeva… - 2013 Sixth …, 2013 - ieeexplore.ieee.org
Data Mining is very popular in today's era because it provides access to the information that
is hidden from a normal human being eye. The hidden information that is made available …
is hidden from a normal human being eye. The hidden information that is made available …
[PDF][PDF] Preserving the Privacy of Sensitive Data Using Bit-Coded-Sensitive Algorithm (BCSA).
Organizations now deal with massive amounts of data. Data is collected from various points
such as hospitals, credit card companies, and search engines. After collecting this …
such as hospitals, credit card companies, and search engines. After collecting this …
Using noise addition method based on pre-mining to protect healthcare privacy
L Liu, K Yang, L Hu, L Li - Journal of Control Engineering and Applied …, 2012 - ceai.srait.ro
With medical device cyber-physical systems being more and more widely used, a lot of
healthcare data are produced, making data sharing for health research a vital requirement …
healthcare data are produced, making data sharing for health research a vital requirement …
Transformation approach for boolean attributes in privacy preserving data mining
R Kaur, M Bansal - 2015 1st International Conference on Next …, 2015 - ieeexplore.ieee.org
Data Mining can be seen as the process of extracting hidden patterns from large databases.
In many situations, the extracted patterns can reveal private information that should not be …
In many situations, the extracted patterns can reveal private information that should not be …
An Effective Association Rule-based Algorithm for Privacy Preserving Frequent Itemset Mining
Abstract [enter Abstract Body] Finding hidden patterns in huge data sets is a technique
known as data mining or knowledge discovery. There are several data mining algorithms …
known as data mining or knowledge discovery. There are several data mining algorithms …
µ-fractal based data perturbation algorithm for privacy protection
J Zhong, V Mirchandani, P Bertok, J Harland - 2012 - aisel.aisnet.org
Many organizations publish anonymous medical data for sociology research, health
research, education and other useful studies. Although attributes that clearly identify …
research, education and other useful studies. Although attributes that clearly identify …