2020
DOI: 10.1016/j.eswa.2020.113380
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing random projection with independent and cumulative additive noise for privacy-preserving data stream mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(24 citation statements)
references
References 26 publications
0
24
0
Order By: Relevance
“…The rotation direction can be any of the three x, y or z axes. For stream data mining, two distinguished data perturbation techniques are proposed in [10] for privacy preservation. Random projection and random translation along with two different forms of additive noise are used to develop the two perturbation techniques in [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The rotation direction can be any of the three x, y or z axes. For stream data mining, two distinguished data perturbation techniques are proposed in [10] for privacy preservation. Random projection and random translation along with two different forms of additive noise are used to develop the two perturbation techniques in [10].…”
Section: Related Workmentioning
confidence: 99%
“…For stream data mining, two distinguished data perturbation techniques are proposed in [10] for privacy preservation. Random projection and random translation along with two different forms of additive noise are used to develop the two perturbation techniques in [10]. Chamikara et al proposed a non-invertible and extendable perturbation algorithm called PABIDOT for the preservation of privacy of big data.…”
Section: Related Workmentioning
confidence: 99%
“…Here, Artificial Neural Networks (ANN), Principal Component Analysis (PCA), Random Forests (RF), and Support Vectors machines (SVM) [ 19 , 20 ] are the latest machine learning algorithm created for the learning procedure that forms the data into two classes, such as disease affected and normal [ 21 ]. However, if the dataset has been highly partial, it cannot be utilized for decision making and data analysis [ 22 , 23 ].…”
Section: Introductionmentioning
confidence: 99%
“…Vol.65: e22210339, 2022 www.scielo.br/babt Different strategies like encryption and cryptography are adopted for covering, concealment, irritation, and anonymization of information. The authors [38] demonstrated that the gatherings scale is frequently elevated, and calculations result in significant computational and correspondence costs. A homomorphic encryption plot and a protected re-appropriated correlation conspire [12] were proposed for security, and several DNA cryptography techniques were adopted for security concerns.…”
Section: Introductionmentioning
confidence: 99%