Author:
Jha Kanhaiya Jee,Ameta Gaurav Kumar,Panchal Esan P.
Publisher
Springer Nature Singapore
Reference28 articles.
1. Ma L, Liu G (2015) A hierarchical trust model for cluster-based wireless sensor network. IEEE. 978-1-4799-9892-0/15 ©2015. Yu S (2016) Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 2751–2763
2. Bertino E, Lin D, Jiang W (2008) A survey of quantification of privacy preserving data mining algorithms. Springer, Berlin, pp 183–205
3. Aldeen YAAS, Salleh M, Razzaque MA (2015) A comprehensive review on privacy preserving data mining. SpringerPlus 4(1):694
4. Malik MB, Ghazi MA, Ali R (2012) Privacy preserving data mining techniques: current scenario and future prospects, Nov 2012. IEEE, pp 26–32
5. Kargupta H, Datta S, Wang Q, Sivakumar K (2003) On the privacy preserving properties of random data perturbation techniques, Nov 2003. IEEE, pp 99–106