2006
DOI: 10.1007/s10115-006-0001-2
|View full text |Cite
|
Sign up to set email alerts
|

Singular value decomposition based data distortion strategy for privacy protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
52
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(52 citation statements)
references
References 13 publications
0
52
0
Order By: Relevance
“…If there is any confidential and sensitive data, a nonnegative matrixfactorization technique can be employed to protect the original data and preserve its overall characteristics (please see details about matrix-factorization technique in Wu et al [38] and Xu el at. [39]). Airline industries are using such an information sharing mechanism in their businesses [31].…”
Section: Valuable Mechanism For Sharing Informationmentioning
confidence: 93%
“…If there is any confidential and sensitive data, a nonnegative matrixfactorization technique can be employed to protect the original data and preserve its overall characteristics (please see details about matrix-factorization technique in Wu et al [38] and Xu el at. [39]). Airline industries are using such an information sharing mechanism in their businesses [31].…”
Section: Valuable Mechanism For Sharing Informationmentioning
confidence: 93%
“…We used the privacy measures of the PPDM methods based on matrix factorization [9][10][11]. We assumed that the original data are denoted by and the modified data are denoted by .…”
Section: Privacy Measuresmentioning
confidence: 99%
“…Only part of the PPDM methods are not algorithm relevant, which includes two main kinds: the k-anonymity model [4][5][6] and methods based on matrix decompositions and transformation [9][10][11], both are perturbation-based methods. They overcome the shortcoming of the algorithm-relevant methods.…”
Section: Introductionmentioning
confidence: 99%
“…To address the privacy problem various privacy preserving data mining methods in both centralized and distributed database environment have been discussed by authors in [4]. The authors in [5] proposed a Singular Value Decomposition (SVD) strategy for privacy preservation. Further they discussed some metrics to measure the difference between distorted dataset and the original dataset and the degree of privacy protection.…”
Section: Literature Surveymentioning
confidence: 99%