共 50 条
- [31] CRYPTANALYSIS OF A CHAOS-BASED ENCRYPTION SCHEME [J]. 2017 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2017), 2017, : 474 - 479
- [32] A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining [J]. 2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 881 - 887
- [33] Optimization for MASK scheme in privacy preserving data mining for association rules [J]. ROUGH SETS AND INTELLIGENT SYSTEMS PARADIGMS, PROCEEDINGS, 2007, 4585 : 465 - 474
- [34] Privacy preserving data mining algorithms without the use of secure computation or perturbation [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 121 - 128
- [35] Evaluating Applicability Of Perturbation Techniques For Privacy Preserving Data Mining By Descriptive Statistics [J]. 2016 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2016, : 607 - 613
- [36] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
- [37] A Classification Based Framework for Privacy Preserving Data Mining [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 660 - 666
- [38] Quantifying privacy for privacy preserving data mining [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 630 - 636
- [40] DETECTIVE: A decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining [J]. 2005 3rd IEEE International Conference on Industrial Informatics (INDIN), 2005, : 701 - 708