1. Variable selection under multicollinearity using modified log penalty
2. ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
3. Data privacy preservation algorithm with k-anonymity
4. Dhany H W , Izhari F , Fahmi H , Encryption and decryption using password based encryption , MD5, and DES[C]//International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017 ). Atlantis Press , 2017: 278-283. Dhany H W, Izhari F, Fahmi H, Encryption and decryption using password based encryption, MD5, and DES[C]//International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press, 2017: 278-283.
5. Dwork C. Differential privacy [C]//Proceedings of the 33rd International Colloquium on Automata, Languages and Programming . Venice, Italy , 2006 , 1 - 12 . Dwork C. Differential privacy [C]//Proceedings of the 33rd International Colloquium on Automata, Languages and Programming. Venice, Italy, 2006, 1-12.