Sumana M.; Hareesha K.S. - In: International Journal of Information Security and … 10 (2016) 4, pp. 58-73
Data maintained at various sectors, needs to be mined to derive useful inferences. Larger part of the data is sensitive and not to be revealed while mining. Current methods perform privacy preservation classification either by randomizing, perturbing or anonymizing the data during mining. These...