0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Classification and Evaluation of Privacy Preserving Data Mining Methods
نویسندگان :
Negar Nasiri
1
Mohammadreza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
کلمات کلیدی :
Information, Privacy, Data Mining, Privacy preserving Data Mining, PPDM
چکیده :
Abstract— In the recently age, the volume of information is growing exponentially. This data can be used in various fields such as business, healthcare, cyber security, etc. Extracting useful knowledge from raw information is an important process. But the challenge in this process is the sensitivity of this information, which has made owners reluctant to share their information. This has led the study of the privacy of data in data mining to be a hot topic today. In this paper, an attempt is made to provide a framework for qualitative analysis of methods. This qualitative framework consists of three main sections: a comprehensive classification of proposed methods, proposed evaluation criteria and their qualitative evaluation. Our main purpose of presenting this framework is 1) systematic introduction of the most important methods of privacy preserving in data mining 2) creating a suitable platform for qualitative comparison of these methods 3) providing the possibility of selecting methods appropriate to the needs of application areas 4) systematic introduction of points Weakness of existing methods as a prerequisite for improving methods of PPDM.
لیست مقالات
لیست مقالات بایگانی شده
Statistical distance-base acceptance strategy for desirable offers in bilateral automated negotiation
Arash Ebrahimnezhad - Dr Hamid Jazayeriy - Dr Faria Nassiri-mofakham
ElectroCNN: Regressive CNN-based Energy Consumption Forecasting Leveraging Weather Data
Dharmi Patel - Mann Patel - Krisha Darji - Rajesh Gupta - Sudeep Tanwar - Jitendra Bhatia - Hossein Shahinzadeh
Detection and Identification of Cyber-Attacks in Cyber-Physical Systems Based on Machine Learning Methods
Zohre Nasiri Zarandi
Enhancing Software Effort Estimation with an Integrated Approach of Particle Swarm Optimization and Genetic Algorithms in Analogy-based Method
Ehsan Nasr - Keyvan Mohebbi
پیاده سازی موازی یک طرح (t,n)-تسهیم چند تصویر با استفاده از GPU
سعیده کبیری راد
مکانیابی خطاهای کاربردها و خدمات نرمافزاری با کمک تولید داده آزمون با نامتغیرهای محتمل
محمد نصرتی مقدم - حسن حقیقی - مجتبی وحیدی اصل
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G
Dhruvi Pancholi - Nilesh Kumar Jadav - Sudeep Tanwar - Deepak Garg - S. Mohammadali Zanjani
From Faces to Words: An Efficient Persian Visual Lip Reading
Mana Amini - Sajjad Aemmi - Azadeh Ashouri - Reza Akhoundzadeh - Kourosh Hassanzadeh - Mohammad Reza Mohammadi
Improving Deep Neural Network Accelerator for Malaria Diseased Blood Cells using FPGA
Hadi Rezaeikarjani - Mojtaba Valinataj
تخلیهبار محاسباتی ریزدانه تحرکآگاه در رایانش لبه برای اینترنت اشیاء
شکوفه نوروزی - دکتر زینب موحدی شکوفه نوروزی - زینب موحدی -
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2