Login / Signup

Privacy preservation through a greedy, distortion-based rule-hiding method.

Peng ChengJohn F. RoddickShu-Chuan ChuChun-Wei Lin
Published in: Appl. Intell. (2016)
Keyphrases
  • data sets
  • privacy preservation
  • preprocessing
  • real world
  • information systems
  • privacy preserving
  • information loss