Return to Article Details Studies on the Use of Various Noise Strategies for Perturbing Data in Privacy-Preserving Data Mining Download Download PDF