2010
DOI: 10.1016/j.ins.2010.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving data mining: A feature set partitioning approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(46 citation statements)
references
References 53 publications
0
43
0
Order By: Relevance
“…Table 4 dataset is given a input to algorithm 1, it processes the dataset by considering randomly generated values of Probability matrix (T) and Mapping matrix (M) and produces a converted table C as shown in table 5. The performance of the proposed methodology is evaluated in terms of two data metrics namely information loss [11] and privacy gain. The following formulae are used to measure information loss ILoss and privacy gain.…”
Section: Resultsmentioning
confidence: 99%
“…Table 4 dataset is given a input to algorithm 1, it processes the dataset by considering randomly generated values of Probability matrix (T) and Mapping matrix (M) and produces a converted table C as shown in table 5. The performance of the proposed methodology is evaluated in terms of two data metrics namely information loss [11] and privacy gain. The following formulae are used to measure information loss ILoss and privacy gain.…”
Section: Resultsmentioning
confidence: 99%
“…The experiments have been evaluated and comparison results with the set of data are done with the existing DMPD approach [3]. The below table and graph describes the performance result of the proposed FC with the existing DMPD approach.…”
Section: Resultsmentioning
confidence: 99%
“…The most widespread technique for achieving observance with kanonymity is to restore definite values with fewer specific but semantically reliable values. In [3], the author proposed a diverse technique for determining k-anonymity by splitting up the unusual dataset into numerous ridges such that all one of them sticks to k-anonymity. In [4], the author explained numerous features of the technique.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Given the importance of understanding the term data mining, we will list a few explanations and definitions of the said term referring to the eminent names in the field. One such definition is given and an article published in the International Journal of Computer Trends and Technology (Matatov et al, 2010). From the previous definition it can be concluded that data mining includes a wide range of tools which in a very short time provide very useful and specific information that can form the basis for making managerial or other decisions.…”
Section: Data Miningmentioning
confidence: 99%