-
1
-
-
80355123447
-
Performance Analysis of Clustering Algorithms in Detecting outliers
-
Jan-Feb
-
Sairam et al "Performance Analysis of Clustering Algorithms in Detecting outliers", International Journal of Computer Science and Information Technologies, Vol. 2 (1), Jan-Feb 2011, 486-488.
-
(2011)
International Journal of Computer Science and Information Technologies
, vol.2
, Issue.1
, pp. 486-488
-
-
Sairam1
-
2
-
-
4544312695
-
Cryptographic Techniques for Privacy-Preserving Data Mining
-
Pinkas,. "Cryptographic Techniques for Privacy-Preserving Data Mining", ACM SIGKDD Explorations, 4(2), 2002.
-
(2002)
ACM SIGKDD Explorations
, vol.4
, Issue.2
-
-
Pinkas1
-
3
-
-
33749557573
-
On the Design and Quantification of Privacy Preserving Data mining algorithms
-
Agrawal D, Aggarwal C. C, "On the Design and Quantification of Privacy Preserving Data mining algorithms", ACM PODS Conference, 2002.
-
(2002)
ACM PODS Conference
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
4
-
-
33646379796
-
Data Swapping:Variations on a theme by Dalenius and Reiss
-
In
-
Fienberg S.E. and McIntyre J. "Data Swapping:Variations on a theme by Dalenius and Reiss. " In Journal of Official Statistics, 21:309-323,2005.
-
(2005)
Journal of Official Statistics
, vol.21
, pp. 309-323
-
-
Fienberg, S.E.1
McIntyre, J.2
-
5
-
-
33646367179
-
Data Shuffling-a new masking approach for numerical data
-
forthcom-ing
-
Muralidhar K. and Sarathy R. " Data Shuffling-a new masking approach for numerical data", Management Science, forthcom-ing, 2006.
-
(2006)
Management Science
-
-
Muralidhar, K.1
Sarathy, R.2
-
6
-
-
84924360822
-
A privacy-enhanced micro-aggregation method
-
In
-
Y. Li, S. Zhu, L. Wang, and S. Jajodia "A privacy-enhanced micro-aggregation method", In Poc. Of 2nd International Symposium on Foundations of Information and Knowledge Systems, pp148-159, 2002.
-
(2002)
Poc. Of 2nd International Symposium on Foundations of Information and Knowledge Systems
, pp. 148-159
-
-
Li, Y.1
Zhu, S.2
Wang, L.3
Jajodia, S.4
-
7
-
-
0242625276
-
Transforming data to satisfy privacy constraints
-
In, Edmonton, Alberta, Canada
-
V.S. Iyengar, "Transforming data to satisfy privacy constraints", In Proc. of SIGKDD'02, Edmonton, Alberta, Canada,2002.
-
(2002)
Proc. of SIGKDD'02
-
-
Iyengar, V.S.1
-
8
-
-
34748906636
-
Fast Fourier Transform based data perturbation method for privacy protection
-
In, New Brunswick New Jersey, May
-
Shuting Xu., Shuhua Lai, "Fast Fourier Transform based data perturbation method for privacy protection", In Proc. of IEEE conference on Intelligence and Security Informatics, New Brunswick New Jersey, May 2007.
-
(2007)
Proc. of IEEE conference on Intelligence and Security Informatics
-
-
Shuting, X.1
Lai, S.2
-
9
-
-
36048948044
-
A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms
-
Shibanth Mukharjee, Zhiyuan Chen, Arya Gangopadhyay, "A privacy preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms", The VLDB journal 2006.
-
(2006)
The VLDB journal
-
-
Mukharjee, S.1
Chen, Z.2
Gangopadhyay, A.3
-
13
-
-
34248666540
-
Fuzzy sets
-
Zadeh L "Fuzzy sets", Inf. Control. Vol.8, PP, 338-353, 1965.
-
(1965)
Inf. Control.
, vol.8
, pp. 338-353
-
-
Zadeh, L.1
-
15
-
-
54449090880
-
An Effective Data Transformation Approach for Privacy Preserving Clustering
-
R. R. Rajalaxmi, A.M. Natarajan "An Effective Data Transformation Approach for Privacy Preserving Clustering", Journal of Computer Science 4(4): 320-326, 2008.
-
(2008)
Journal of Computer Science
, vol.4
, Issue.4
, pp. 320-326
-
-
Rajalaxmi, R.R.1
Natarajan, A.M.2
-
16
-
-
80051498791
-
Fuzzy based approach for privacy preserving publication of data
-
January
-
V. Vallikumari, S. Srinivasa Rao, KVSVN Raju, KV Ramana, BVS Avadhani "Fuzzy based approach for privacy preserving publication of data", IJCSNS, Vol.8 No.1, January 2008.
-
(2008)
IJCSNS
, vol.8
, Issue.1
-
-
Vallikumari, V.1
Srinivasa Rao, S.2
Raju, K.V.S.V.N.3
Ramana, K.V.4
Avadhani, B.V.S.5
|