Protecting data: a fuzzy approach
From MaRDI portal
Publication:3451411
DOI10.1080/00207160.2014.928700zbMath1343.68076OpenAlexW2049677173MaRDI QIDQ3451411
Irene Díaz, Pedro Alonso, Susana Montes, Pelayo Quirós
Publication date: 16 November 2015
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2014.928700
Related Items (2)
New computational and statistical models in science and economics ⋮ On cardinalities of finite interval-valued hesitant fuzzy sets
Cites Work
- Privacy-preserving algorithms for distributed mining of frequent itemsets
- A note on rule representation in expert systems
- Fuzzy \(\delta\)-\(\varepsilon\)-partitions.
- Privacy-preserving trajectory data publishing by local suppression
- Identifying the Risk of Attribute Disclosure by Mining Fuzzy Rules
- THE NECESSITY OF THE STRONG α-CUTS OF A FUZZY SET
- ACHIEVING k-ANONYMITY PRIVACY PROTECTION USING GENERALIZATION AND SUPPRESSION
- A new approach to clustering
This page was built for publication: Protecting data: a fuzzy approach