0% Complete
فارسی
Home
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Classification and Evaluation of Privacy Preserving Data Mining Methods
Authors :
Negar Nasiri
1
Mohammadreza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
Keywords :
Information, Privacy, Data Mining, Privacy preserving Data Mining, PPDM
Abstract :
Abstract— In the recently age, the volume of information is growing exponentially. This data can be used in various fields such as business, healthcare, cyber security, etc. Extracting useful knowledge from raw information is an important process. But the challenge in this process is the sensitivity of this information, which has made owners reluctant to share their information. This has led the study of the privacy of data in data mining to be a hot topic today. In this paper, an attempt is made to provide a framework for qualitative analysis of methods. This qualitative framework consists of three main sections: a comprehensive classification of proposed methods, proposed evaluation criteria and their qualitative evaluation. Our main purpose of presenting this framework is 1) systematic introduction of the most important methods of privacy preserving in data mining 2) creating a suitable platform for qualitative comparison of these methods 3) providing the possibility of selecting methods appropriate to the needs of application areas 4) systematic introduction of points Weakness of existing methods as a prerequisite for improving methods of PPDM.
Papers List
List of archived papers
تشخیص مراحل خواب با کمک جنگل تصادفی و ویژگی های فرکانسی استخراج شده از سیگنال های EEG و EOG
سیدعلی حسینی
سیستم تشخیص نفوذ مبتنی برشبکه عصبی کانولوشن برای تشخیص حمله انکارسرویس در اینترنت وسایل نقلیه
زهرا جانفدا - سید امین حسینی سنو
OENMOP: Loss-Aware 4×4 and 5×5 and Scalable Non‑blocking Optical Switches Designed for Odd-Even Routing Algorithm for Chip-Scale Interconnection Networks
Negin Bagheri Renani - Elham Yaghoubi - Mina Mohammadirad
Automatic Analysis of Inconsistencies in Inter-Enterprise Business Processes: Introducing a Formal Adaptation Patterns Catalog
Somayeh Ashourian - Shohreh َAjoudanian
ارائه مدل یادگیری ماشین برای پیشبینی سریزمانی باینری از دیدگاه مسئلههای دستهبندی با کاربرد در پیشبینی نتهای موسیقی
نیلوفر ع��دلخانی - حسام عمرانپور
A Fuzzy Cluster-Based Routing Algorithm to Extend Wireless Sensor Network Lifetime
Mostafa Mirzaie - Armin Mazinani - Dr Sayyed Majid Mazinani
A High-Speed Quantum Reversible Controlled Adder/Subtractor Circuit
Negin Mashayekhi - Mohammad Reza Reshadinezhad - Shekoofeh Moghimi
Dealing with Black-hole Attacks in Inter-vehicle Networks Using the Packet Delivery Rate Algorithm
Marzieh Sedighi - Mehdi Hamidkhani - Mostafa Sadeghi
رویکردی در تشخیص خودکار بوهای بد در مدل های معماری سازمانی با استفاده از تحلیل گرافی
زهرا رحیمی تمندگانی - شهره آجودانیان
شناسایی حملات فیشینگ با استفاده از الگوریتم عقاب آتشین و شبکه عصبی کانولوشن
علی کوشاری - مهدی فرتاش
more
Samin Hamayesh - Version 42.5.2