Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/1481
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChallagalla, Ajay-
dc.contributor.authorDhiraj, S. S. Shivaji-
dc.contributor.authorSomayajulu, D.V.L.N-
dc.contributor.authorMathew, Toms Shaji-
dc.contributor.authorTiwari, Saurav-
dc.contributor.authorAhmad, Syed Sharique-
dc.date.accessioned2024-11-13T06:33:18Z-
dc.date.available2024-11-13T06:33:18Z-
dc.date.issued2010-
dc.identifier.citation10.1109/COMPSACW.2010.35en_US
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/1481-
dc.descriptionNITWen_US
dc.description.abstractData objects which do not comply with the general behavior or model of the data are called Outliers. Outlier Detection in databases has numerous applications such as fraud detection, customized marketing, and the search for terrorism. However, the use of Outlier Detection for various purposes has raised concerns about the violation of individual privacy. Therefore, Privacy Preserving Outlier Detection must ensure that privacy concerns are addressed and balanced, so that the data analyst can get the benefits of outlier detection without being thwarted by legal counter-measures by privacy advocates. In this paper, we propose a technique for detecting outliers while preserving privacy, using hierarchical clustering methods. We analyze our technique to quantify the privacy preserved by this method and also prove that reverse engineering the perturbed data is extremely difficult.en_US
dc.language.isoenen_US
dc.publisherProceedings - International Computer Software and Applications Conferenceen_US
dc.subjectData miningen_US
dc.subjectOutlier Detectionen_US
dc.titlePrivacy Preserving Outlier Detection using Hierarchical Clustering Methodsen_US
dc.typeOtheren_US
Appears in Collections:Computer Science & Engineering

Files in This Item:
File Description SizeFormat 
Privacy_Preserving_Outlier_Detection_Using_Hierarchical_Clustering_Methods.pdf669.69 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.