Login / Signup
Privacy preservation through a greedy, distortion-based rule-hiding method.
Peng Cheng
John F. Roddick
Shu-Chuan Chu
Chun-Wei Lin
Published in:
Appl. Intell. (2016)
Keyphrases
</>
data sets
privacy preservation
preprocessing
real world
information systems
privacy preserving
information loss