A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms
2016
International Journal of Computer Applications
In this survey paper, on current researches made on privacy preserving data mining technique with fuzzy logic, neural network learning, secured sum and various encryption algorithm is presented. ...
This will enable to grasp the various challenges faced in privacy preserving data mining and also help us to find best suitable technique for various data environment. ...
This paper express a complete detailed survey on recent algorithms which are proposed for achieving a privacy preserving data mining using fuzzy logic, Neural networks, and other asymmetric encryption ...
doi:10.5120/ijca2016907917
fatcat:5rl3whokrrhijjdapggjrsilxu
Securing Informative Fuzzy Association Rules using Bayesian Network
2019
International Journal of Advanced Computer Science and Applications
Privacy preservation is used for valuable information extraction and minimizing the risk of sensitive information disclosure. ...
Privacy preservation of maximum number of sensitive FARs by keeping minimum perturbation highlights the significance of our model. ...
A Bayesian network-based model has been used as well in privacy preservation [23] . ...
doi:10.14569/ijacsa.2019.0101068
fatcat:dfe6wecbnjcglgrxl7r2lomiei
PPaaS: Privacy Preservation as a Service
[article]
2020
arXiv
pre-print
It enhances the usability of privacy-preserving methods within its pool; it is a generic platform that can be used to sanitize big data in a granular, application-specific manner by employing a suitable ...
The proposed method employs selective privacy preservation via data perturbation and looks at different dynamics that can influence the quality of the privacy preservation of a dataset. ...
The privacy preservation module consists of pools of application logic (e.g. classification and association mining), and pools of privacy preservation algorithms (e.g. matrix multiplication, additive perturbation ...
arXiv:2007.02013v2
fatcat:3dwye765zrar7mwgg7xhhdebbu
Privacy Preserving Fuzzy Based Decision Tree Classifier
2017
International Journal of Advanced Research in Computer Science and Software Engineering
Fuzzy logic is used to preserve the privacy in the system and decision tree is used for classification. ...
In this paper, the advantages of fuzzy logic and decision tree are used to build the privacy preserving classifier. ...
In this paper, fuzzy logic is used in order to preserve the privacy and decision tree is used to extract the rules and to classify the data.
II. ...
doi:10.23956/ijarcsse/v6i12/0200
fatcat:eup35korrfgizlglv74ggaeshm
Clustering based Privacy Preserving of Big Data using Fuzzification and Anonymization Operation
2019
International Journal of Advanced Computer Science and Applications
Clustering based Privacy preservation of individual data in big data with minimum perturbation and successful reconstruction highlights the significance of our model in addition to the use of standard ...
The existing privacy preserving methods use different algorithms that results into limitation of data reconstruction while securing the sensitive data. ...
Al [11] used min-max normalization, fuzzy logic, rail fence and map range to preserve the privacy of individual by masking the sensitive attributes. ...
doi:10.14569/ijacsa.2019.0101239
fatcat:nnikj5mxt5hwng4tnkstbroney
An Improved Rotation-Based Privacy Preserving Classification in Web Mining Using Naïve Bayes Classifier
2020
Studies in Informatics and Control
data renovation and classification on perturbed data is done using Naïve Bayes classifier. ...
The classifier is improved by using a holdout approach on data separation in training and testing phases. ...
Here the first phase of data perturbation is done by grouping the data using a fuzzy approach and this fuzzy logic is used to perform clustering on large volume data. ...
doi:10.24846/v30i4y202004
fatcat:bth7sdt6rjg2tigp7xboclec2e
A Hybrid Clustering Approach and Random Rotation Perturbation (RRP) for Privacy Preserving Data Mining
2018
International Journal of Intelligent Engineering and Systems
As privacy preserving data mining grants, sharing and exchanging of privacy susceptible data for analysis, it has exploited increasingly popular. ...
The Privacy Preserving Data Mining (PPDM) is known to be the most critical perspective among analysts. ...
Random rotation perturbation for privacy preserving Data perturbation is an imperative system for privacy-preserving the data. ...
doi:10.22266/ijies2018.1231.17
fatcat:l3h22vrlffelxfltd6nlyky3ly
Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey
2016
International Journal of Computer Applications
The main categorization of Privacy Preserving Data Mining (PPDM) techniques falls into Perturbation, Secure Sum Computations and Cryptographic based techniques. ...
Privacy has become crucial in knowledge based applications. Proper integration of individual privacy is essential for data mining operations. ...
A technique k-means clustering for anonymizing using Fuzzy logic is proposed in [54] . The record in cluster k is anonymized to make it indistinguishable from remaining k-1 clusters. ...
doi:10.5120/ijca2016909006
fatcat:k37zgytczbh6pjpse3wqu2inva
Privacy Preserving in Data Mining using Bi-party Data Releasing Method
2018
IJARCCE
In this topic the privacy preserving in Data mining works with Bi-Party Data Release Method. ...
The exponential mechanism chooses a candidate that is close to optimum with respect to a utility function while preserving differential privacy. ...
In this concept, new big data association rule hiding technique is presented, which uses fuzzy logic approach. ...
doi:10.17148/ijarcce.2018.71017
fatcat:4otcuxevlrewpfdh3cag4ejq2a
Fuzzy Framework for Preserving Privacy in Neural Networks Classification
2016
International Journal of Computer Applications
has been preserved as in the absence of integrated privacy constraints. ...
In this paper, a methodology has been developed to resolve the privacy issue by integrating fuzzy logic in the process of NN classification and at the same time the accuracy of the results of the NN classification ...
Genetic algorithms, Neural networks, Rough sets, and Fuzzy logic are some of the most widely used soft computing techniques. Fuzzy sets specialize in dealing with uncertainty [9] [10] . ...
doi:10.5120/ijca2016910290
fatcat:y6cvcorlhzdsxa6sxnzn743ake
FSSPCM: Fuzzy Publication of Data for Privacy Preserving
2016
International Journal of Security and Its Applications
The paper proposed a transformation algorithm for privacy preserving data publishing based on fuzzy semantic set pair cloud model (FSSPCM). ...
K-anonymity method is the most widely used privacy protection model and has been well researched. ...
Privacy Preserving Data Publication based on Fuzzy Semantic Set Pair Cloud Model Numerical data is the most common and important form in data publishing. ...
doi:10.14257/ijsia.2016.10.11.20
fatcat:3ld4tl25abcljlidnunz2owsne
Preserving Privacy and Optimizing Neural Network Classification by using a Mix of Soft Computing Techniques
2016
International Journal of Computer Applications
Data mining in general and NNs in particular are being used in various areas where privacy of individuals is at stake. ...
An Artificial Neural Network (ANN) commonly called as Neural Network (NN) is a mathematical tool that is used in data mining for the analysis of data. ...
The most widely used soft computing techniques in developing data mining solutions are Neural Networks, Rough Sets, Genetic Algorithms and Fuzzy logic [2] . ...
doi:10.5120/ijca2016911188
fatcat:kuqxk77u7bdtbm5v2zkd5djxly
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure
2018
Multimedia tools and applications
Therefore, the papers of this special issue address variety of security and privacy challenges and developments in multimedia big data in critical infrastructure from the perspective of providing security ...
Specially, security and privacy of multimedia big data in the critical infrastructure (a nation's strategic national assets, i.e. banking and finance, communications, emergency services, energy, food chain ...
perturbation algorithm to preserve privacy for social network was proposed considering preservation privacy of vertices properties and community structures simultaneously. ...
doi:10.1007/s11042-018-6426-2
fatcat:jfuzcmb62fh3vajha3vdttj4km
On Differential Privacy-Based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment
2021
IEEE Access
To address the problem, this paper proposes DP-FCNN, that implements Differential Privacy using a Fuzzy Convolution Neural Network (FCNN) with Laplace Mechanism for injecting noise. ...
INDEX TERMS Differential privacy, fuzzy, convolution neural network, Merkle hash tree. ...
This fuzzification leads to data perturbation which in turn preserves privacy of the original data. ...
doi:10.1109/access.2021.3063603
fatcat:7xtdjndignb5ddk5rmftj4uhdq
Opposition Intensity-Based Cuckoo Search Algorithm for Data Privacy Preservation
2019
Journal of Intelligent Systems
Privacy-preserving data mining (PPDM) is a novel approach that has emerged in the market to take care of privacy issues. ...
The conventional works include numerous techniques, most of which employ some form of transformation on the original data to guarantee privacy preservation. ...
In 2016, Komishani et al. [12] adopted a scheme known as preserving privacy in trajectory data (PPTD), a new methodology for data preservation depending on the perception of privacy. ...
doi:10.1515/jisys-2018-0420
fatcat:vaadqyf2azeylfexczskqmf7si
« Previous
Showing results 1 — 15 out of 651 results