In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
— Recent work [12] shows that conventional privacy preserving publishing techniques based on anonymity-groups are susceptible to corruption attacks. In a corruption attack, if th...