We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 5,069 results
  1. Privacy-Preserving Data Mining

    The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The...
    C. Clifton, M. Kantarcıoğlu, J. Vaidya in Foundations and Advances in Data Mining
    Chapter
  2. Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review

    This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM),...

    U. H. W. A. Hewage, R. Sinha, M. Asif Naeem in Artificial Intelligence Review
    Article Open access 22 February 2023
  3. Privacy-Preserving Data Mining (PPDM)

    Data mining is a highly productive tool, while also a source for privacy violation. Privacy has become one of the most significant concerns in the...
    Chapter 2023
  4. Image-based random rotation for preserving the data in data mining process

    The privacy and security of big data have become a major concern in recent years, necessitating privacy-preserving data mining strategies to preserve...

    Nadella Sunil, G. Narsimha in Signal, Image and Video Processing
    Article 19 March 2024
  5. Fast privacy-preserving utility mining algorithm based on utility-list dictionary

    Privacy preserving utility mining (PPUM) aims to solve the problem of sensitive information leakage in utility pattern mining. In recent years,...

    Chunyong Yin, Ying Li in Applied Intelligence
    Article 27 October 2023
  6. Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm

    Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...

    Duy Thanh Tran, Jun-Ho Huh in The Journal of Supercomputing
    Article 18 March 2023
  7. A new algorithm using integer programming relaxation for privacy-preserving in utility mining

    High-utility itemset mining (HUIM) is an effective technique for discovering significant information in data. However, data containing sensitive and...

    Duc Nguyen, Minh-Thai Tran, Bac Le in Applied Intelligence
    Article 03 August 2023
  8. Edgelet computing: enabling privacy-preserving decentralized data processing at the network edge

    The convergence of opportunistic networks and trusted execution environments at the network edge presents a compelling opportunity for fully...

    Ludovic Javet, Nicolas Anciaux, ... Philippe Pucheral in Personal and Ubiquitous Computing
    Article 14 June 2024
  9. A Pragmatic Privacy-Preserving Deep Learning Framework Satisfying Differential Privacy

    With the increasing use of technology in our daily lives, data privacy has become a critical issue. It is essential to carefully design technologies...

    Tran Khanh Dang, Phat T. Tran-Truong in SN Computer Science
    Article 26 December 2023
  10. Community-Preserving Social Graph Release with Node Differential Privacy

    The goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an...

    Sen Zhang, Wei-Wei Ni, Nan Fu in Journal of Computer Science and Technology
    Article 30 November 2023
  11. Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system

    E-healthcare system has been introduced to provide real-time patient health monitoring using IoT sensors and efficiently share patient data with...

    Chanchal Maurya, Vijay Kumar Chaurasiya in Multimedia Tools and Applications
    Article 27 March 2023
  12. Privacy-Preserving Data Collection and Analysis for Smart Cities

    Smart cities leverage real-world data to digitally replicate city-related aspects such as disaster prevention, transportation, and pandemics,...
    Chapter Open access 2024
  13. Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study

    Association rule mining can be used in healthcare data mining to provide solutions to life-threatening diseases like recent COVID-19. Due to...

    Nikunj Domadiya, Udai Pratap Rao in SN Computer Science
    Article 18 August 2021
  14. Multi-objective optimization-based privacy in data mining

    This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing...

    Hemanta Kumar Bhuyan, Vinayakumar Ravi, M. Srikanth Yadav in Cluster Computing
    Article 12 July 2022
  15. Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective

    As the Industrial Internet of Things (IIoT) continues to advance, ensuring robust data privacy in data aggregation processes becomes paramount. This...

    G. Jagadeesh, M. Pounambal, ... Celestine Iwendi in Signal, Image and Video Processing
    Article 07 May 2024
  16. Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition

    Data mining has received many applications in diverse areas such as banking, marketing, healthcare and fraud detection. One of the valuable tools in...

    Mehrad Jaberi, Hamid Mala in The Journal of Supercomputing
    Article 06 April 2023
  17. Survey: federated learning data security and privacy-preserving in edge-Internet of Things

    The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning...

    Haiao Li, Lina Ge, Lei Tian in Artificial Intelligence Review
    Article Open access 29 April 2024
  18. PriMonitor: An adaptive tuning privacy-preserving approach for multimodal emotion detection

    The proliferation of edge computing and the Internet of Vehicles (IoV) has significantly bolstered the popularity of deep learning-based driver...

    Lihua Yin, Sixin Lin, ... Yuanyuan He in World Wide Web
    Article 02 February 2024
  19. Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining

    The confidential data is mainly managed by creating passwords, tokens, and unique identifiers in an authorized manner. These records must be kept in...

    D. Dhinakaran, P. M. Joe Prathap in The Journal of Supercomputing
    Article 20 May 2022
  20. Research on Privacy Protection Methods for Data Mining

    With the applications of big data and cloud computing technologies in industries, data mining technologies have been develo** rapidly in these...
    **dong He, Rongyan Cai, ... Dan Wu in Big Data and Security
    Conference paper 2023
Did you find what you were looking for? Share feedback.