首页 | 本学科首页   官方微博 | 高级检索  
     


Mitigating the ICA Attack against Rotation‐Based Transformation for Privacy Preserving Clustering
Authors:Abedelaziz Mohaisen  Dowon Hong
Abstract:The rotation‐based transformation (RBT) for privacy preserving data mining is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple‐rotation‐based transformation technique for special mining applications, mitigating the ICA attack while maintaining the advantages of the RBT.
Keywords:RBT  ICA  Multiple rotations  data clustering
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号