4.5 Article

An efficient perturbation approach for multivariate data in sensitive and reliable data mining

Related references

Note: Only part of the references are listed.
Review Computer Science, Artificial Intelligence

Data mining privacy preserving: Research agenda

Inda Kreso et al.

Summary: With the increasing amount of data and information in the modern era, data mining has become a crucial method to search for useful data patterns and predictions. However, privacy-preserving data mining (PPDM) techniques aim to protect privacy while providing accurate data mining results.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2021)

Article Computer Science, Information Systems

Privacy preserving distributed machine learning with federated learning

M. A. P. Chamikara et al.

Summary: Edge computing and distributed machine learning have advanced to a level that can revolutionize a particular organization. Federated learning (FedML) is a method to protect privacy in machine learning, but additional measures are needed to ensure data privacy.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Theory & Methods

Scheduling workflows with privacy protection constraints for big data applications on cloud

Yiping Wen et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Artificial Intelligence

Investigating the impact of data normalization on classification performance

Dalwinder Singh et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Efficient privacy preservation of big data for accurate data mining

M. A. P. Chamikara et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Artificial Intelligence

A reversible privacy-preserving clustering technique based on k-means algorithm

Chen-Yi Lin

APPLIED SOFT COMPUTING (2020)

Review Computer Science, Artificial Intelligence

Educational data mining and learning analytics: An updated survey

Cristobal Romero et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2020)

Article Computer Science, Information Systems

An efficient and scalable privacy preserving algorithm for big data and data streams

M. A. P. Chamikara et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Artificial Intelligence

Privacy-preserving collaborative fuzzy clustering

Lingjuan Lyu et al.

DATA & KNOWLEDGE ENGINEERING (2018)

Article Computer Science, Information Systems

Efficient data perturbation for privacy preserving and accurate data stream mining

M. A. P. Chamikara et al.

PERVASIVE AND MOBILE COMPUTING (2018)

Article Physics, Multidisciplinary

Grand Challenges in Social Physics: In Pursuit of Moral Behavior

Valerio Capraro et al.

FRONTIERS IN PHYSICS (2018)

Review Engineering, Electrical & Electronic

A Survey of Big Data Security and Privacy Preserving

Wei Fang et al.

IETE TECHNICAL REVIEW (2017)

Article Computer Science, Information Systems

A semi-supervised privacy-preserving clustering algorithm for healthcare

Meiyu Huang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

A survey: deriving private information from perturbed data

Burcu D. Okkalioglu et al.

ARTIFICIAL INTELLIGENCE REVIEW (2015)

Article Computer Science, Hardware & Architecture

An approach for prevention of privacy breach and information leakage in sensitive data mining

M. Prakash et al.

COMPUTERS & ELECTRICAL ENGINEERING (2015)

Article Management

Benchmarking state-of-the-art classification algorithms for credit scoring: An update of research

Stefan Lessmann et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2015)

Article Engineering, Biomedical

Data Perturbation Method Based on Contrast Mapping for Reversible Privacy-preserving Data Mining

Yuan-Hung Kao et al.

JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING (2015)

Article Physics, Mathematical

Saving Human Lives: What Complexity Science and Information Systems can Contribute

Dirk Helbing et al.

JOURNAL OF STATISTICAL PHYSICS (2015)

Article Computer Science, Artificial Intelligence

A probabilistic approach to mitigate composition attacks on privacy in non-coordinated environments

A. H. M. Sarowar Sattar et al.

KNOWLEDGE-BASED SYSTEMS (2014)

Review Computer Science, Artificial Intelligence

A Review on Ensembles for the Class Imbalance Problem: Bagging-, Boosting-, and Hybrid-Based Approaches

Mikel Galar et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2012)

Article Computer Science, Artificial Intelligence

Geometric data perturbation for privacy preserving outsourced data mining

Keke Chen et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2011)

Article Computer Science, Hardware & Architecture

Privacy-preserving data mining systems

Nan Zhang et al.

COMPUTER (2007)

Article Computer Science, Artificial Intelligence

Singular value decomposition based data distortion strategy for privacy protection

Shuting Xu et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2006)

Article Computer Science, Information Systems

State-of-the-art in privacy preserving data mining

VS Verykios et al.

SIGMOD RECORD (2004)