共 50 条
- [3] Random-data perturbation techniques and privacy-preserving data mining [J]. Knowledge and Information Systems, 2005, 7 : 387 - 414
- [4] A Hybrid Approach of Privacy Preserving Data Mining using Suppression and Perturbation Techniques [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIVE MECHANISMS FOR INDUSTRY APPLICATIONS (ICIMIA), 2017, : 306 - 311
- [5] The applicability of the perturbation model-based privacy preserving data mining for real-world data [J]. ICDM 2006: SIXTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, WORKSHOPS, 2006, : 507 - +
- [7] Geometric data perturbation for privacy preserving outsourced data mining [J]. Knowledge and Information Systems, 2011, 29 : 657 - 695
- [8] Privacy Preserving Data Utility Mining Using Perturbation [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY (ICDCIT 2018), 2018, 10722 : 112 - 120
- [9] On the privacy preserving properties of random data perturbation techniques [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2003, : 99 - 106
- [10] A Framework for Evaluating Privacy Preserving Data Mining Algorithms* [J]. Data Mining and Knowledge Discovery, 2005, 11 : 121 - 154