2014
DOI: 10.1007/s10586-014-0393-9
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving sub-feature selection based on fuzzy probabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…The authors of [22] developed a clustering-based anonymization approach to preserve the characteristics of streaming data. [23] framed a privacy protective sub-feature choice approach mostly based on fuzzy possibilities. Recently, in [24] the authors found that k-anonymity will be achieved by non-homogeneous generalization, and proposed a method named ring generalization to realize higher utility whereas providing identical privacy guarantee.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [22] developed a clustering-based anonymization approach to preserve the characteristics of streaming data. [23] framed a privacy protective sub-feature choice approach mostly based on fuzzy possibilities. Recently, in [24] the authors found that k-anonymity will be achieved by non-homogeneous generalization, and proposed a method named ring generalization to realize higher utility whereas providing identical privacy guarantee.…”
Section: Related Workmentioning
confidence: 99%
“…Since few papers on sub-feature selection are available in different sites, it only considers the concept of sub-features that explained in [10,11] and helped to design the model of sub-feature selection for the proposed work. Next, it considers the framework for correlation among features for classification.…”
Section: B Approaches Of Sub-feature Selectionmentioning
confidence: 99%
“…Further the new feature can be included for analyzing the classification problem, but the concept of tiny feature data from each feature is considered for generating new class. Initially, Bhuyan and Kamila have initiated to design the concept of sub-feature data and applied in [10,11] using different database. Although they have used the sub-feature selection data as their own model, still it needs to develop different sub-feature selection model for classification.…”
Section: Introductionmentioning
confidence: 99%
“…Some other references [20][21][22][23][24] also discussed privacy preserving methods based on fuzzy theory from different aspects. Reference [20] addressed the problem of privacy preserving in data mining by transforming the sensitive attributes to fuzzy attributes (for example: very low, low, medium, high, very high).…”
Section: Related Workmentioning
confidence: 99%