A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering
2008
ETRI Journal
ABSTRACT⎯The rotation-based transformation (RBT) for privacy preserving data mining is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple-rotation-based transformation technique for special mining applications, mitigating the ICA attack while maintaining the advantages of the RBT.
doi:10.4218/etrij.08.0208.0134
fatcat:rxlqaxgfzzfcvluodutv6yvt6e