Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Thanveer Jahan"'
Publikováno v:
Materials Today: Proceedings. 80:2614-2619
Privacy preserving data mining has much importance in the data analysis because it maintains confidential or highly sensitive data in the purpose of data analysis. Many perturbation techniques are developed, but do not perform well. There are used fo
Autor:
Thanveer Jahan
Publikováno v:
Data Integrity and Data Governance
Data Integrity and Data Governance ISBN: 9781839688621
Data Integrity and Data Governance ISBN: 9781839688621
Today’s applications rely on large volumes of personal data being collected and processed regularly. Many unauthorized users try to access this private data. Data perturbation methods are one among many Privacy Preserving Data Mining (PPDM) techniq
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::807310e90f80b4c0bae7bbb54300d81a
https://mts.intechopen.com/articles/show/title/multiplicative-data-perturbation-using-random-rotation-method
https://mts.intechopen.com/articles/show/title/multiplicative-data-perturbation-using-random-rotation-method
Autor:
Thanveer Jahan
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811929397
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cffebaa1266970e172f662a9cf43b148
https://doi.org/10.1007/978-981-19-2940-3_17
https://doi.org/10.1007/978-981-19-2940-3_17
Publikováno v:
Proceedings of the Second International Conference on Computational Intelligence and Informatics ISBN: 9789811082276
Data mining methods analyze the patterns found in data, irrespective of the confidential information of an individual. It has led to raise privacy concerns about confidential data. Different methods are inhibited in data mining to protect these data.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dc4e76a4094adec8b16e0fe0db9a017b
https://doi.org/10.1007/978-981-10-8228-3_2
https://doi.org/10.1007/978-981-10-8228-3_2
Publikováno v:
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies.
In Data mining is the method of extracting the knowledge from huge amount of data and interesting patterns. With the rapid increase of data storage, cloud and service-based computing, the risk of misuse of data has become a major concern. Protecting
Autor:
Thanveer Jahan
Publikováno v:
IOSR Journal of Computer Engineering. 5:25-29
In designing various security and privacy related data mining applications, privacy preserving has become a major concern. Protecting sensitive or confidential information in data mining is an important long term goal. An increased data disclosure ri
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9783319036915
The latest advances in the field of information technology have increased enormous growth in the data collection in this era. Individual’s data are shared for business or legal reasons, containing sensitive information. Sharing data is a mutual ben
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2349646f12f8d76151364258bd755278
https://doi.org/10.1007/978-3-319-03692-2_13
https://doi.org/10.1007/978-3-319-03692-2_13
Publikováno v:
Third International Conference on Computational Intelligence and Information Technology (CIIT 2013).
The latest advances in the field of information technology have increased enormous growth in the data collection in recent days. Individual's data are shared for business or legal reasons, which contain confidential information. Sharing data is a mut
Publikováno v:
WOCN
Privacy Preserving plays a vital role; in designing various security-related data mining applications. Protecting sensitive information in data mining has become an important issue. Data distortion or data perturbation is a critical component, widely