2009 Second International Conference on Emerging Trends in Engineering &Amp; Technology 2009
DOI: 10.1109/icetet.2009.232
|View full text |Cite
|
Sign up to set email alerts
|

Wavelet Transform Based Data Perturbation Method for Privacy Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“… Secure AI: Research in this area aims to create AI-based algorithms that are impervious to cyberattacks. This is significant for 5G networks since the network will be managed and controlled by AI models [60][61][62].…”
Section: Challenges and Future Research Directionsmentioning
confidence: 99%
“… Secure AI: Research in this area aims to create AI-based algorithms that are impervious to cyberattacks. This is significant for 5G networks since the network will be managed and controlled by AI models [60][61][62].…”
Section: Challenges and Future Research Directionsmentioning
confidence: 99%
“…Our transformation technique is compared with existing distance preserving transformation techniques such as FISIP and wavelet transformations. Privacy measures of IRIS dataset using Wavelet Transformations are taken from [15]. Based on these values, we say that our proposed transformation preserves distance as well as knowledge without loss.…”
Section: Position Differencementioning
confidence: 99%