Return to Article Details Exploring Privacy-Preserving Methods via Perturbation Data Mining Employing Diverse Noise Strategies Download Download PDF