Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
8
Page No.
2138 - 2142
References
Brankovic, L. and V.E. Castro, 2011. Privacy issues in knowledge discovery and data mining. Privacy Issues Knowl., 1: 45-56.
Chen, Y., H. Chen, A. Gorkhali, Y. Lu and Y. Ma
et al., 2016. Big data analytics and big data science: A survey. J. Manage. Anal., 3: 1-42.
Direct Link | Cooley, J. and S. Smith, 2013. Privacy-preserving screen capture: Towards closing the loop for health IT usability. J. Biomed. Inf., 46: 721-733.
PubMed | Direct Link | Dong, X., J. Yu, Y. Luo, Y. Chen and G. Xue
et al., 2014. Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. Comput. Secur., 42: 151-164.
Direct Link | Giannotti, F., L.V. Lakshmanan, A. Monreale, D. Pedreschi and H. Wang, 2013. Privacy-preserving mining of association rules from outsourced transaction databases. IEEE. Syst. J., 7: 385-395.
CrossRef | Direct Link | Guo, D., X. Zhu, H. Jin, P. Gao and C. Andris, 2012. Discovering spatial patterns in origin‐destination mobility data. Trans. GIS., 16: 411-429.
CrossRef | Direct Link | Islam, M.Z. and L. Brankovic, 2011. Privacy preserving data mining: A noise addition framework using a novel clustering technique. Knowl. Based Syst., 24: 1214-1223.
Direct Link | Jiang, Q., M.K. Khan, X. Lu, J. Ma and D. He, 2016. A privacy preserving three-factor authentication protocol for E-Health clouds. J. Supercomputing, 72: 3826-3849.
CrossRef | Direct Link | Kawamoto, J., 2016. An implementation of privacy preserving stream integration system. Proceedings of the 2016 International Conference on Information Networking (ICOIN), January 13-15, 2016, IEEE, Fukuoka, Japan, ISBN:978-1-5090-1724-9, pp: 57-62.
Kumar, J.P., A.U. Kumar and T. Ravi, 2016. Beyond M-score for detection of misusability by malicious insiders. Proceedings of the 3rd International Conference on Computing for Sustainable Global Development (INDIACom), March 16-18, 2016, IEEE, Chennai, India, ISBN:978-9-3805-4421-2, pp: 155-159.
Li, L., R. Lu, K.K.R. Choo, A. Datta and J. Shao, 2016. Privacy-preserving-outsourced association rule mining on vertically partitioned databases. IEEE. Trans. Inf. Forensics Secur., 11: 1847-1861.
CrossRef | Direct Link | Matatov, N., L. Rokach and O. Maimon, 2010. Privacy-preserving data mining: A feature set partitioning approach. Inf. Sci., 180: 2696-2720.
Direct Link | Oksanen, J., C. Bergman, J. Sainio and J. Westerholm, 2015. Methods for deriving and calibrating privacy-preserving heat maps from mobile sports tracking application data. J. Transp. Geogr., 48: 135-144.
Direct Link | Taneja, H. and A.K. Singh, 2015. Preserving privacy of patients based on Re-identification risk. Procedia Comput. Sci., 70: 448-454.
Direct Link | Turner, S.D., S.M. Dudek and M.D. Ritchie, 2010. Athena: A knowledge-based hybrid backpropagation-grammatical evolution neural network algorithm for discovering epistasis among quantitative trait Loci. Bio. Data Min., 3: 1-18.
CrossRef | PubMed | Direct Link | Victor, N., D. Lopez and J.H. Abawajy, 2016. Privacy models for big data: A survey. Intl. J. Big Data Intell., 3: 61-75.
Direct Link | Waqar, A., A. Raza, H. Abbas and M.K. Khan, 2013. A framework for preservation of cloud users data privacy using dynamic reconstruction of metadata. J. Network Comput. Appl., 36: 235-248.
Direct Link | Yan, S., S. Pan, Y. Zhao and W.T. Zhu, 2016. Towards privacy-preserving data mining in online social networks: Distance-grained and item-grained differential privacy. Proceedings of the Australasian Conference on Information Security and Privacy, July 4-6, 2016, Springer, New York, USA., pp: 141-157.
Zhang, Q., L.T. Yang and Z. Chen, 2016. Privacy preserving deep computation model on cloud for big data feature learning. IEEE. Trans. Comput., 65: 1351-1362.
Direct Link |