메뉴 건너뛰기




Volumn 7, Issue 1, 2011, Pages 27-40

Fuzzy based clustering algorithm for privacy preserving data mining

Author keywords

Data mining; Decision trees; Fuzzy set; PPDM; Privacy preserving data mining

Indexed keywords


EID: 78649834382     PISSN: 17460972     EISSN: 17460980     Source Type: Journal    
DOI: 10.1504/IJBIS.2011.037295     Document Type: Article
Times cited : (42)

References (21)
  • 1
    • 57149136993 scopus 로고    scopus 로고
    • Privacy-preserving data mining: Models and algorithms
    • ISBN978-0-387-70991-8
    • Aggarwal, C.C., Yu, P.S. (Eds.) (2008) 'Privacy-preserving data mining: models and algorithms', Advances in Database Systems, Springer series, Vol. 34, No. 22, p.514, ISBN978-0-387-70991-8.
    • (2008) Advances in Database Systems, Springer Series , vol.34 , Issue.22 , pp. 514
    • Aggarwal, C.C.1    Yu, P.S.2
  • 5
    • 0040425984 scopus 로고    scopus 로고
    • Masking microdata using micro-aggregation
    • Defays, D. and Anwar, M.N. (1998) 'Masking microdata using micro-aggregation', Journal of Social Statistics, Vol. 14, pp.449-461.
    • (1998) Journal of Social Statistics , vol.14 , pp. 449-461
    • Defays, D.1    Anwar, M.N.2
  • 6
    • 35048897655 scopus 로고    scopus 로고
    • An empirical comparison of SDC methods for continuous microdata in terms of information loss and re-identification risk'
    • presented at the, Skopje, Macedonia
    • Domingo-Ferrer, J. and Mateo-Sanz, J.M. (2001) 'An empirical comparison of SDC methods for continuous microdata in terms of information loss and re-identification risk', presented at the UNECE Workshop on Statistical Data Editing, Skopje, Macedonia.
    • (2001) UNECE Workshop on Statistical Data Editing
    • Domingo-Ferrer, J.1    Mateo-Sanz, J.M.2
  • 9
    • 0000983892 scopus 로고
    • Masking procedures for microdata disclosure limitation
    • Fuller, W.A. (1993) 'Masking procedures for microdata disclosure limitation', Journal of Official Statistics, Vol. 9, pp.383-406.
    • (1993) Journal of Official Statistics , vol.9 , pp. 383-406
    • Fuller, W.A.1
  • 10
  • 11
    • 35048849248 scopus 로고
    • Subdomain estimation for the masked data
    • American Statistical Association
    • Kim, J.J. (1960) 'Subdomain estimation for the masked data', Proceedings of the Section on Survey Research Methods, pp.456-461, American Statistical Association.
    • (1960) Proceedings of the Section on Survey Research Methods , pp. 456-461
    • Kim, J.J.1
  • 12
    • 0002956175 scopus 로고
    • A method for limiting disclosure in microdata based on random noise and transformation
    • American Statistical Association
    • Kim, J.J. (1986) 'A method for limiting disclosure in microdata based on random noise and transformation', Proceedings of the Section on Survey Research Methods, pp.303-308, American Statistical Association.
    • (1986) Proceedings of the Section on Survey Research Methods , pp. 303-308
    • Kim, J.J.1
  • 16
    • 0005685575 scopus 로고
    • C4.5 programs for machine learning
    • Quinlan, R.J. (1993) 'C4.5 programs for machine learning', Morgan Kaufmann, available at http://www.cs.waikato.ac.nz/ml/weka/
    • (1993) Morgan Kaufmann
    • Quinlan, R.J.1
  • 17
    • 0021389555 scopus 로고
    • Practical data swapping: The first steps
    • Reiss, S. P. (1984) 'Practical data swapping: the first steps', ACM Transactions on Database Systems, Vol. 9, pp.20-37.
    • (1984) ACM Transactions on Database Systems , vol.9 , pp. 20-37
    • Reiss, S.P.1
  • 18
    • 0019546487 scopus 로고
    • Security of statistical databases: Multidimensional transformation
    • Schlrer, J. (1981) 'Security of statistical databases: multidimensional transformation', ACM Transactions on Database Systems, Vol. 6, pp.91-112.
    • (1981) ACM Transactions on Database Systems , vol.6 , pp. 91-112
    • Schlrer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.