DOI:10.20894/IJDMTA. Periodicity: Bi Annual. Impact Factor: SJIF:4.893 & GIF:0.787 Submission:Any Time Publisher: IIR Groups Language: English Review Process: Double Blinded
Slava Kisilevich, Lior Rokach, Yuval Elovici, "Efficient Multidimensional Suppression for K-Anonymity", IEEE Transactions on Knowledge and Data Engineerin ,Vol.22 ,Issue 3 ,2010 View Artical
J.R. Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann ,1993 View Artical
M. Kantarcioglu, J. Jin, and C. Clifton, "When Do Data Mining Results Violate Privacy? ,2004 View Artical
L. Rokach, R. Romano, and O. Maimon, "Negation Recognition in Medical Narrative Reports", Information Retrieval, ,Vol.11 ,Issue 6 ,2008 View Artical
M.S. Wolf and C.L. Bennett, "Local Perspective of the Impact of the HIPAA Privacy Rule on Research", Cancer-Philadelphia Then Hoboken ,Vol.106 ,Issue 2 ,2006 View Artical
P. Samarati and L. Sweeney, "Generalizing Data to Provide Anonymity When Disclosing Information", Proc. 17th ACM SIGACT-SIGMODSIGART Symp. Principle ,Vol.17 ,1998 View Artical
L. Sweeney,, "k-Anonymity: A Model for Protecting Privacy", Int?l J.Uncertainty, Fuzziness, and Knowledge-Base ,Vol.10 ,Issue 5 ,2002 View Artical
L. Sweeney, "Achieving k-Anonymity Privacy Protection Using Generalization and Suppression", Int?l J.Uncertainty, Fuzziness, and Knowledge-Base ,Vol.10 ,Issue 5 ,2002 View Artical
B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization forInformation and Privacy Preservation", Proc. 21st IEEE Int?lConf.Data Eng. (ICDE ?05) ,2005 View Artical
K. Wang, P.S. Yu, and S. Chakraborty, "Bottom-Up Generalization: A Data Mining Solution to Privacy Protection", Proc.Fourth IEEE Int?lConf. Data Mining ,2004 View Artical
Tiancheng and I. Ninghui, "Optimal K-Anonymity with Flexible Generalization Schemes through Bottom-Up Searching", Proc. Sixth IEEE Int?l Conf. Data Mining Workshops ,2006 View Artical
S.V. Iyengar, "Transforming Data to Satisfy Privacy Constraints", Proc.Eighth ACM SIGKDD ,2002 View Artical
B.C.M. Fung, K. Wang, and P.S. Yu, "Anonymizing Classification Data for Privacy Preservation", IEEE Trans. Knowledge and Data Eng. ,Vol.19 ,Issue 5 ,2007 View Artical
K. LeFevre, D.J. DeWitt, and R. Ramakrishnan, "Incognito: Efficient Full Domain k-Anonymity", Proc. 2005 ACM SIGMOD ,2005 View Artical
A. Friedman, R. Wolff, and A. Schuster, "Providing k-Anonymity in Data Mining", Int?l J. Very Large Data Bases ,Vol.17 ,Issue 4 ,2008 View Artical