Data Mining with Differential Privacy Categories and Subject DescriptorsFriedman, ArikSchuster, Assaf
论文总结(Frequent Itemsets Mining With Differential Privacy Over Large-Scale Data) 一、论文目标:将差分隐私和频繁项集挖掘结合,主要针对大规模数据。 二、论文的整体思路: 1)预处理阶段: 对于大的数据集,进行采样得到采样数据集并计算频繁项集,估计样本数据集最大长度限制,然后再缩小源数据集;(根据最小的suppor...
Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner. However, locally differential data can twist the probability density of the data bec
Although the above method satisfies the differential privacy with privacy budget of ε in the data publishing process, it does not take into account the association relationship between attributes and cannot provide value for subsequent data mining. Based on the above analysis results, this paper prop...
This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM), including t
Data mining is becoming increasingly important in the data-driven society in recent years. Unfortunately, privacy of the individuals fails to be protected and considered deliberately. It’s a significantly challenging question that outputs of data mining
"Studying data mining and data warehousing with different e-learning system," IJACSA) International Journal of Advanced Computer Science and Applications, vol... MF Alajmi,S Khan,DA Sharma - 《International Journal of Advanced Computer Science & Applications》 被引量: 8发表: 2013年 Leveraging Mach...
Finite element approximation of elliptic partial differential equations on implicit surfaces The aim of this paper is to investigate finite element methods for the solution of elliptic partial differential equations on implicitly defined surfaces. ... M Burger - 《Computing & Visualization in Science》 ...
Differential privacy, introduced byDwork (2006), is an attempt to define privacy from a different perspective. This seminal work consider the situation of privacy-preserving data miningin which there is a trusted curator who holds a private databaseD. The curator responses to queries issued by da...
and Defensive Ability of Latent Dirichlet Allocation Model Training Under Rényi Differential Privacy ...