Abdul K. Mustafa

Learn More
In recent years, there has been an alarming increase of online identity theft and attacks using personally identifiable information. The goal of privacy preservation is to de-associate individuals from sensitive or microdata information. Microaggregation techniques seeks to protect microdata in such a way that can be published and mined without providing(More)
Support Vector Machines (SVMs) have been used in many areas such as regression, classification and novelity detection due to its accuracy and generalizability. Recently SVMs have been proposed for clustering analysis as well. Support Vector Clustering (SVC) works by finding the minimum enclosing sphere of data points using SVM training. SVC is a boundary(More)
This paper presents a K-means clustering technique that satisfies the biobjective function to minimize the information loss and maintain k-anonymity. The proposed technique starts with one cluster and subsequently partitions the dataset into two or more clusters such that the total information loss across all clusters is the least, while satisfying the(More)
In recent years, there has been an alarming increase of online identity theft and attacks using personally identifiable information. The goal of privacy preservation is to de-associate individuals from sensitive or microdata information. Microaggregation techniques seeks to protect microdata in such a way that can be published and mined without providing(More)
  • 1