[PDF][PDF] Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation.

B Murugeshwari, S Rajalakshmi… - … Systems Science & …, 2023 - cdn.techscience.cn
Imagine numerous clients, each with personal data; individual inputs are severely corrupt,
and a server only concerns the collective, statistically essential facets of this data. In several …

[PDF][PDF] Evaluation of Re-identification risk using anonymization and differential privacy in healthcare

R Ratra, P Gulia, NS Gill - International Journal of Advanced …, 2022 - academia.edu
In the present scenario, due to regulations of data privacy, sharing of data with other
organization for research or any medical purpose becomes a big hindrance for different …

DP-PartFIM: Frequent Itemset Mining using Differential Privacy and Partition

X Liu, W Gan, L Yu, Y Liu - IEEE Transactions on Emerging …, 2024 - ieeexplore.ieee.org
Itemset mining is a popular data mining technique for extracting interesting and valuable
information from large datasets. However, since datasets contain sensitive private data, it is …

Big data privacy preservation using principal component analysis and random projection in healthcare

R Ratra, P Gulia, NS Gill… - … Problems in Engineering, 2022 - Wiley Online Library
With the rising usage of technology, a tremendous volume of data is being produced in the
current scenario. This data contains a lot of personal data and may be given to third parties …

[PDF][PDF] Performance analysis of perturbation-based privacy preserving techniques: an experimental perspective.

R Ratra, P Gulia, NS Gill - International Journal of Electrical & …, 2023 - researchgate.net
Nowadays, enormous amounts of data are produced every second. These data also contain
private information from sources including media platforms, the banking sector, finance …

Performance Exploration of Network Intrusion Detection System with Neural Network Classifier on The KDD Dataset.

S Devaraju, D Soni, S Jawahar… - … Journal of Safety & …, 2024 - search.ebscohost.com
Abstract Network Intrusion Detection Systems (NIDS) are a difficult task for determining in
any managerial information system or IT sectors, if a user is a normal user or an attacker …

[PDF][PDF] Research Article Big Data Privacy Preservation Using Principal Component Analysis and Random Projection in Healthcare

R Ratra, P Gulia, NS Gill, JM Chatterjee - 2022 - academia.edu
With the rising usage of technology, a tremendous volume of data is being produced in the
current scenario. is data contains a lot of personal data and may be given to third parties …

[PDF][PDF] A bibliometric review and future directions in Cloud Architecture and Security in Web of Science from 2008 to 2022

K Boam - Computer Integrated Manufacturing Systems - researchgate.net
Cloud computing offers services on demand over the Internet with the help of a sizable
amount of virtual storage. Cloud computing has become increasingly integrated with …

Comparison of machine learning methods for OHSUMED-F Data Set: A Cardiovascular Diseases Simulation Study

V Gupta, SK Sinha - NeuroQuantology, 2022 - search.proquest.com
Abstract This work uses Machine Learning (ML) Techniques to enhance the concert of
Cardiovascular Disease (CVD) prediction on the OHSUMED-F facts set. The OHSUMED-F …