random data perturbation technique
Privacy Preserving through Data Perturbation using Random Rotation Based Technique in Data Mining
6
A Study on Data Perturbation Techniques in Privacy Preserving Data Mining
5
An overview of Multiplicative data perturbation for privacy preserving Data mining
9
Challenges and Methods of Data Perturbation Techniques
5
Random Projection-based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining
23
A Comparative Study of Multiplicative Data Perturbation Techniques for Privacy Preserving Data Mining
7
Preserving Privacy Using Data Perturbation in Data Stream
6
Hybrid Perturbation Technique using Feature Selection Method for Privacy Preservation in Data Mining
8
Perturbation Method for Data Privacy, Divide and Conquer Method
7
Randomized Additive Data Perturbation and Reconstruction Technique to Approximate Distribution of Original Information in PPDM
6
Privacy Preserving for Data Perturbation Using Cryptography Technique
5
A Survey of Perturbation Technique For Privacy-Preserving of Data
5
Preserving Data Mining through Data Perturbation
6
Geometric Data Perturbation Techniques in Privacy Preserving On Data Stream Mining
6
Perturbation Based Privacy Preserving Data Mining
7
Population dynamical behavior of non-autonomous Lotka-Volterra competitive system with random perturbation
23
A Comparative Study on Data Perturbation with Feature Selection
6
Performance of Multiplicative Data Perturbation for Privacy Preserving Data Mining
8
General Integral Control Design via Singular Perturbation Technique
10
Deviations of Steady States of the Traveling Wave to a Competition Diffusion System with Random Perturbation
13