Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
This study investigates existing input privacy-preserving data mining (PPDM) methods and
privacy-preserving data stream mining methods (PPDSM), including their strengths and …
privacy-preserving data stream mining methods (PPDSM), including their strengths and …
Min max normalization based data perturbation method for privacy protection
YK Jain, SK Bhandare - International Journal of Computer and …, 2013 - cir.nii.ac.jp
抄録< jats: p> Data mining system contain large amount of private and sensitive data such
as healthcare, financial and criminal records. These private and sensitive data can not be …
as healthcare, financial and criminal records. These private and sensitive data can not be …
Data mining: min–max normalization based data perturbation technique for privacy preservation
A Kiran, D Vasumathi - Proceedings of the third international conference …, 2020 - Springer
Data mining system deals with huge volume of information which may include personal and
sensitive information about the individuals such as bank credential details, financial records …
sensitive information about the individuals such as bank credential details, financial records …
Optimal privacy preserving technique over big data analytics using oppositional fruit fly algorithm
A Kiran, V Devara - Recent Advances in Computer Science …, 2020 - ingentaconnect.com
Background: Big data analytics is the process of utilizing a collection of data accompanied
on the internet to store and retrieve anywhere and at any time. Big data is not simply a data …
on the internet to store and retrieve anywhere and at any time. Big data is not simply a data …
[PDF][PDF] Evaluating Partitioning Based Clustering Methods for Extended Non-negative Matrix Factorization (NMF).
N Bhandari, P Pahwa - Intelligent Automation & Soft Computing, 2023 - cdn.techscience.cn
Data is humongous today because of the extensive use of World Wide Web, Social Media
and Intelligent Systems. This data can be very important and useful if it is harnessed …
and Intelligent Systems. This data can be very important and useful if it is harnessed …
An illustration to secured way of data mining using privacy preserving data mining
R Purohit, D Bhargava - Journal of Statistics and Management …, 2017 - Taylor & Francis
The aim of data mining is to extract useful information from huge source of multiple data. But
during the process of data mining, intentionally or unintentionally the data becomes visible …
during the process of data mining, intentionally or unintentionally the data becomes visible …
Achieving data privacy using extended NMF
N Bhandari, P Pahwa - … and Data Science Applications: Proceedings of …, 2022 - Springer
Data mining plays a vital role today for decision making and analysis in education, health
care, business and more. It is very important to protect the data before the mining process …
care, business and more. It is very important to protect the data before the mining process …
Novel hybrid geometric data perturbation technique by means of sampling data intervals
Privacy preserving data mining has much importance in the data analysis because it
maintains confidential or highly sensitive data in the purpose of data analysis. Many …
maintains confidential or highly sensitive data in the purpose of data analysis. Many …
Shearing based data transformation approach for privacy preserving clustering
G Manikandan, N Sairam, R Sudhan… - 2012 Third …, 2012 - ieeexplore.ieee.org
Data mining is a technique used to extract un-known patterns from large volume of data.
Privacy has be-come a major concern in data mining. The data which are stored in the …
Privacy has be-come a major concern in data mining. The data which are stored in the …
[PDF][PDF] Data distortion based privacy preserving method for data mining system
SK Bhandare - International Journal of Emerging Trends & Technology …, 2013 - Citeseer
Data mining system contain large amount of private and confidential information such as
healthcare, financial and criminal records. This confidential information cannot be share to …
healthcare, financial and criminal records. This confidential information cannot be share to …