2000 character limit reached
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
Published 1 Jun 2009 in cs.CR | (0906.0202v1)
Abstract: The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.