2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribu 2016
DOI: 10.1109/snpd.2016.7515960
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy set based data publishing for privacy preservation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…In this perspective, fuzzy transformation method is used to distort the sensitive/quasi attributes values by using the fuzzy membership function. The process of generating membership values for a fuzzy variable using membership function is termed as fuzzification [27,28]. A membership function defines the mapping of membership value of input space between 0 and 1.…”
Section: Fuzzification and Anonymization Operation On Sensitivementioning
confidence: 99%
See 1 more Smart Citation
“…In this perspective, fuzzy transformation method is used to distort the sensitive/quasi attributes values by using the fuzzy membership function. The process of generating membership values for a fuzzy variable using membership function is termed as fuzzification [27,28]. A membership function defines the mapping of membership value of input space between 0 and 1.…”
Section: Fuzzification and Anonymization Operation On Sensitivementioning
confidence: 99%
“…Fuzzy based experimental results were better than kanonymity method in context of loss and performance. The performance and information loss are minimized 48% to 59% and 40% to 50% respectively [18].…”
Section: Literature Reviewmentioning
confidence: 99%