A review on privacy-preserving data preprocessing

M Soni, YK Barot, S Gomathi - Journal of Cybersecurity and …, 2021 - americaspg.com
Health care information has great potential for improving the health care system and also
providing fast and accurate outcomes for patients, predicting disease outbreaks, gaining …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

[HTML][HTML] Steering data quality with visual analytics: The complexity challenge

S Liu, G Andrienko, Y Wu, N Cao, L Jiang, C Shi… - Visual Informatics, 2018 - Elsevier
Data quality management, especially data cleansing, has been extensively studied for many
years in the areas of data management and visual analytics. In the paper, we first review and …

[PDF][PDF] 隐私计算研究范畴及发展趋势

李凤华, 李晖, 贾焰, 俞能海… - Journal on …, 2016 - infocomm-journal.com
随着移动互联网, 云计算和大数据技术的广泛应用, 电商, 搜索, 社交网络等服务在提供便利的
同时, 大数据分析使用户隐私泄露的威胁日益凸显, 不同系统隐私保护策略和能力的差异性使 …

Privacy-preserving data mining: Why, how, and when

J Vaidya, C Clifton - IEEE Security & Privacy, 2004 - ieeexplore.ieee.org
Data mining is under attack from privacy advocates because of a misunderstanding about
what it actually is and a valid concern about how it is generally done. This article shows how …

A border-based approach for hiding sensitive frequent itemsets

X Sun, PS Yu - Fifth IEEE International Conference on Data …, 2005 - ieeexplore.ieee.org
Sharing data among organizations often leads to mutual benefit. Recent technology in data
mining has enabled efficient extraction of knowledge from large databases. This, however …

Dare to share: Protecting sensitive knowledge with data sanitization

A Amiri - Decision Support Systems, 2007 - Elsevier
Data sanitization is a process that is used to promote sharing of transactional databases
among organizations while alleviating concerns of individual organizations by preserving …

Privacy preserving data mining: A noise addition framework using a novel clustering technique

MZ Islam, L Brankovic - Knowledge-Based Systems, 2011 - Elsevier
During the whole process of data mining (from data collection to knowledge discovery)
various sensitive data get exposed to several parties including data collectors, cleaners …

A maxmin approach for hiding frequent itemsets

GV Moustakides, VS Verykios - Data & Knowledge Engineering, 2008 - Elsevier
In this paper, we are proposing a new algorithmic approach for sanitizing raw data from
sensitive knowledge in the context of mining of association rules. The new approach (a) …

Exact knowledge hiding through database extension

A Gkoulalas-Divanis… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
In this paper, we propose a novel, exact border-based approach that provides an optimal
solution for the hiding of sensitive frequent itemsets by (i) minimally extending the original …