Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey: deriving private information from perturbed data
Privacy-preserving data mining has attracted the attention of a large number of researchers.
Many data perturbation methods have been proposed to ensure individual privacy. Such …
Many data perturbation methods have been proposed to ensure individual privacy. Such …
A taxonomy of 3D occlusion management techniques
While an important factor in depth perception, the occlusion effect in 3D environments also
has a detrimental impact on tasks involving discovery, access, and spatial relation of objects …
has a detrimental impact on tasks involving discovery, access, and spatial relation of objects …
A survey on privacy preserving approaches in data publishing
Y Zhao, M Du, J Le, Y Luo - 2009 First International Workshop …, 2009 - ieeexplore.ieee.org
Privacy preserving in data publishing has become one of the most important research topics
in data security field and it has become a serious concern in publication of personal data in …
in data security field and it has become a serious concern in publication of personal data in …
Peer-to-peer secure multi-party numerical computation
We propose an efficient framework for enabling secure multi-party numerical computations
in a Peer-to-Peer network. This problem arises in a range of applications such as …
in a Peer-to-Peer network. This problem arises in a range of applications such as …
[PDF][PDF] Privacy preserving data mining techniques: Challenges and issues
Privacy preserving becomes an important issue in the development of various data mining
techni'ques. In this paper, we have discussed various techniques to preserve privacy while …
techni'ques. In this paper, we have discussed various techniques to preserve privacy while …
A privacy review of vertically partitioned data-based PPCF schemes
E-commerce companies utilize collaborative filtering approaches to provide
recommendation in order to attract customers. Consumer participation through supplying …
recommendation in order to attract customers. Consumer participation through supplying …
Peer-to-peer secure multi-party numerical computation facing malicious adversaries
We propose an efficient framework for enabling secure multi-party numerical computations
in a Peer-to-Peer network. This problem arises in a range of applications such as …
in a Peer-to-Peer network. This problem arises in a range of applications such as …
A privacy attack that removes the majority of the noise from perturbed data
M Sramka - The 2010 international joint conference on neural …, 2010 - ieeexplore.ieee.org
Data perturbation is a sanitization method that helps restrict the disclosure of sensitive
information from published data. We present an attack on the privacy of the published data …
information from published data. We present an attack on the privacy of the published data …
Discovering sequential patterns from medical datasets
Sequential patterns mining from data is a well stated data mining problem. It has a number
of applications such as DNA sequencing, signal processing, speech analysis etc. In this …
of applications such as DNA sequencing, signal processing, speech analysis etc. In this …
[PDF][PDF] Contemporary trends in privacy preserving collaborative data mining-a survey
A Shah, R Gulati - … of the 2015 International Conference on …, 2015 - researchgate.net
Growing concerns amongst the competitors for maintaining the privacy of their customer's
information has increased in recent years. Multiple parties desire to collaborate to conduct …
information has increased in recent years. Multiple parties desire to collaborate to conduct …