2021
DOI: 10.1007/s12083-021-01080-y
|View full text |Cite
|
Sign up to set email alerts
|

Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 39 publications
0
5
0
Order By: Relevance
“…Perturbation based privacy preservation methods proposed for data stream mining are Chamikara et al (2018), Martínez Rodríguez et al (2017, Virupaksha and Dondeti (2021), Denham et al (2020), Rajalakshmi and Mala (2013). In Chamikara et al (2018), "P2Ro-CAl", a combination of Condensation, rotation, and random swapping has been proposed for data stream classification.…”
Section: Ppdm Methods For Data Stream Miningmentioning
confidence: 99%
See 2 more Smart Citations
“…Perturbation based privacy preservation methods proposed for data stream mining are Chamikara et al (2018), Martínez Rodríguez et al (2017, Virupaksha and Dondeti (2021), Denham et al (2020), Rajalakshmi and Mala (2013). In Chamikara et al (2018), "P2Ro-CAl", a combination of Condensation, rotation, and random swapping has been proposed for data stream classification.…”
Section: Ppdm Methods For Data Stream Miningmentioning
confidence: 99%
“…However, the noise addition filter has the risk of disclosure. An anonymization method based on noise addition for privacy preservation has been proposed in Virupaksha and Dondeti (2021) for clustering. This method chooses random noise within the subspace limits of the dense and non-dense subspaces to reduce information loss and enhance cluster identification.…”
Section: Ppdm Methods For Data Stream Miningmentioning
confidence: 99%
See 1 more Smart Citation
“…Cui proposed two parallel methods of decision tree, one based on synchronous tree and the other based on split tree [14]. Virupaksha and Dondeti proposed the implementation of parallel algorithm of decision tree classification algorithm in PVM system and realized this method through PVM [15]. Radhika and Masood proposed a parallel algorithm of decision tree classification algorithm based on MPI.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Privacy Metric-Matching /reidentification of data: Each algorithm in this review has its performance measure of privacy. K-anonymity primarily uses entropy to quantify information loss [3], while in differential privacy using k-means, disclosure risk is used to identify before and after adding noise to a cluster [16,17]. The dummy location success can also be measured using entropy.…”
Section: Performance Metrics and Their Measurementmentioning
confidence: 99%