2015
DOI: 10.1016/j.procs.2015.06.049
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Preserved Data Mining Approach Based on k-Partite Graph Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The authors designed a model for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients before it is integrated at the server side. In the work of Bhat et al [12], a graph theoretical approach based on k-partitioning of graphs, which paves way to creation of a complex decision tree classifier, organised in a prioritised hierarchy, was proposed to address problems causing a big privacy breach. Navarro-Arribas et al [13] addressed the problems of protecting sensitive data items in query logs by ensuring the anonymity of the users in the logs.…”
Section: Related Workmentioning
confidence: 99%
“…The authors designed a model for privacy-preserving computation of multidimensional aggregates on data partitioned across multiple clients before it is integrated at the server side. In the work of Bhat et al [12], a graph theoretical approach based on k-partitioning of graphs, which paves way to creation of a complex decision tree classifier, organised in a prioritised hierarchy, was proposed to address problems causing a big privacy breach. Navarro-Arribas et al [13] addressed the problems of protecting sensitive data items in query logs by ensuring the anonymity of the users in the logs.…”
Section: Related Workmentioning
confidence: 99%
“…The major concern of these schemes is to preserve the sensitive data [20,23] of parties, while they achieve valuable knowledge from the entire dataset. A major concern in DM [5,16] is the process of finding out frequent item sets, and subsequently association rules [21] are frequently exploited in numerous areas. The majority of the PPDM [9,11] schemes exploit a transformation that minimizes the convenience of the underlying data when it is applied to data-mining algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…The "Got:"-fields and other data in the email can regularly recognize the sender, averting unknown cores. [5,6,7]…”
mentioning
confidence: 99%