Search
Search Results
-
Privacy-Preserving Data Mining
The growth of data mining has raised concerns among privacy advocates. Some of this is based on a misunderstanding of what data mining does. The... -
Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
This study investigates existing input privacy-preserving data mining (PPDM) methods and privacy-preserving data stream mining methods (PPDSM),...
-
Privacy-Preserving Data Mining (PPDM)
Data mining is a highly productive tool, while also a source for privacy violation. Privacy has become one of the most significant concerns in the... -
Image-based random rotation for preserving the data in data mining process
The privacy and security of big data have become a major concern in recent years, necessitating privacy-preserving data mining strategies to preserve...
-
Fast privacy-preserving utility mining algorithm based on utility-list dictionary
Privacy preserving utility mining (PPUM) aims to solve the problem of sensitive information leakage in utility pattern mining. In recent years,...
-
Forecast of seasonal consumption behavior of consumers and privacy-preserving data mining with new S-Apriori algorithm
Nowadays, supermarkets and retail stores all use software systems with databases to store customer transactions. Over time, the volume of data is...
-
A new algorithm using integer programming relaxation for privacy-preserving in utility mining
High-utility itemset mining (HUIM) is an effective technique for discovering significant information in data. However, data containing sensitive and...
-
Edgelet computing: enabling privacy-preserving decentralized data processing at the network edge
The convergence of opportunistic networks and trusted execution environments at the network edge presents a compelling opportunity for fully...
-
A Pragmatic Privacy-Preserving Deep Learning Framework Satisfying Differential Privacy
With the increasing use of technology in our daily lives, data privacy has become a critical issue. It is essential to carefully design technologies...
-
Community-Preserving Social Graph Release with Node Differential Privacy
The goal of privacy-preserving social graph release is to protect individual privacy while preserving data utility. Community structure, which is an...
-
Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system
E-healthcare system has been introduced to provide real-time patient health monitoring using IoT sensors and efficiently share patient data with...
-
Privacy-Preserving Data Collection and Analysis for Smart Cities
Smart cities leverage real-world data to digitally replicate city-related aspects such as disaster prevention, transportation, and pandemics,... -
Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study
Association rule mining can be used in healthcare data mining to provide solutions to life-threatening diseases like recent COVID-19. Due to...
-
Multi-objective optimization-based privacy in data mining
This paper addresses the data privacy based on interactive computation using an optimization model in data mining. When data are computed or sharing...
-
Federated recurrent-based adaptive battle royale algorithm for privacy-preserving data aggregation in industrial IoT: a signal, image, and video processing perspective
As the Industrial Internet of Things (IIoT) continues to advance, ensuring robust data privacy in data aggregation processes becomes paramount. This...
-
Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition
Data mining has received many applications in diverse areas such as banking, marketing, healthcare and fraud detection. One of the valuable tools in...
-
Survey: federated learning data security and privacy-preserving in edge-Internet of Things
The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning...
-
PriMonitor: An adaptive tuning privacy-preserving approach for multimodal emotion detection
The proliferation of edge computing and the Internet of Vehicles (IoV) has significantly bolstered the popularity of deep learning-based driver...
-
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining
The confidential data is mainly managed by creating passwords, tokens, and unique identifiers in an authorized manner. These records must be kept in...
-
Research on Privacy Protection Methods for Data Mining
With the applications of big data and cloud computing technologies in industries, data mining technologies have been develo** rapidly in these...