Related work. Basic concepts. The basics of data perturbation. The basics of imaging geometry. The family of geometric data transformation methods. Basic definitions. The translation data perturbation method. The scaling data perturbation method. The rotation data perturbation method. The hybrid data perturbation method. Experimental results. Methodology. Measuring effectiveness. Quantifying privacy. Improving privacy. Conclusions.SBBD 2003. Na publicação: Stanley R. M. Oliveira
Data mining has been a popular research area for more than a decade due to its vast spectrum of appl...
Clustering-based data masking approaches are widely used for privacy-preserving data sharing and dat...
The freedom and transparency of information flow on the Internet has heightened concerns of privacy....
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The ...
Huge volume of detailed personal data is regularly collected and sharing of these data is proved to ...
Outsourcing data to external parties for analysis is risky as the privacy of confidential variables ...
is very important to be able to find out useful information from huge amount of data. In this paper ...
Privacy preservation is a major concern when the application of data mining techniques to large repo...
Abstract Data mining is the process of extracting patterns from data. Data mining is seen as an inc...
Clustering is one of the most useful techniques to do some data analysis. But the conventional way t...
Abstract – The sharing of data is often beneficial in data mining applications. It has been proven u...
networking and database technologies have enabled the collection and storage of large quantities of ...
In current era of sharing unlimited digital information via the network, protecting the privacy of i...
Despite enormous benefits and the extremely fast proliferation of data mining in recent years, data ...
Privacy-preserving data analysis is an emerging area that addresses the dilemma of performing data a...
Data mining has been a popular research area for more than a decade due to its vast spectrum of appl...
Clustering-based data masking approaches are widely used for privacy-preserving data sharing and dat...
The freedom and transparency of information flow on the Internet has heightened concerns of privacy....
Preserving the privacy of individuals when data are shared for clustering is a complex problem. The ...
Huge volume of detailed personal data is regularly collected and sharing of these data is proved to ...
Outsourcing data to external parties for analysis is risky as the privacy of confidential variables ...
is very important to be able to find out useful information from huge amount of data. In this paper ...
Privacy preservation is a major concern when the application of data mining techniques to large repo...
Abstract Data mining is the process of extracting patterns from data. Data mining is seen as an inc...
Clustering is one of the most useful techniques to do some data analysis. But the conventional way t...
Abstract – The sharing of data is often beneficial in data mining applications. It has been proven u...
networking and database technologies have enabled the collection and storage of large quantities of ...
In current era of sharing unlimited digital information via the network, protecting the privacy of i...
Despite enormous benefits and the extremely fast proliferation of data mining in recent years, data ...
Privacy-preserving data analysis is an emerging area that addresses the dilemma of performing data a...
Data mining has been a popular research area for more than a decade due to its vast spectrum of appl...
Clustering-based data masking approaches are widely used for privacy-preserving data sharing and dat...
The freedom and transparency of information flow on the Internet has heightened concerns of privacy....