2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials 2015
DOI: 10.1109/icstm.2015.7225414
|View full text |Cite
|
Sign up to set email alerts
|

Preservation of privacy in data mining by using PCA based perturbation technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Ansgar et al (2015) discussed the impact of functional safety and development of intelligent transportation systems using service-oriented architectures. The outcome of this approach emphasizes process capability standards and functional safety for reliable transportation but lags in security and visibility of the system [24].…”
Section: Related Workmentioning
confidence: 99%
“…Ansgar et al (2015) discussed the impact of functional safety and development of intelligent transportation systems using service-oriented architectures. The outcome of this approach emphasizes process capability standards and functional safety for reliable transportation but lags in security and visibility of the system [24].…”
Section: Related Workmentioning
confidence: 99%
“…The particular tweets are analyzed and classified using text analytics and natural language processing, because the dataset contains a vast amount of data with various words and slangs. In the second step, those collected tweets are analyzed to clean the non-textual emoticons, contents, numerical values and important information are extracted [23]. The emotions are detected from the extracted tweets in the third step then, the opinions and its reviews are inspected.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In the work [20][21][22], a security framework based on Zero-knowledge evidence provides anonymous authentication for new consumers. But, the major limitation of the model is the communication overhead.…”
Section: Introductionmentioning
confidence: 99%