Return to Article Details Evaluating Privacy-Preserving Strategies via Perturbation based Data Mining Using Diverse Noise Techniques Download Download PDF