A new algorithm-independent method for privacy-preserving classification based on sample generation

被引:0
|
作者
School of Electronic and Control Engineering, Chang’an University, Xi’an [1 ]
Shaanxi
710064, China
机构
[1] School of Electronic and Control Engineering, Chang’an University, Xi’an, 710064, Shaanxi
来源
Open. Cybern. Syst. J. | / 1卷 / 443-447期
基金
中国国家自然科学基金;
关键词
Data mining; Data perturbation; Privacy preserving;
D O I
10.2174/1874110X01509010443
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method for classification based on sample generation. This method is a data-perturbation-based method and has three steps. First, it trains classifiers use the original data. Then, it generates new samples as the perturbed data randomly. Finally, it use the classifiers trained in the first step to predict these samples’ category. The experiments show that this new method can produce usable data while protecting privacy well. © Li and Xi.
引用
收藏
页码:443 / 447
页数:4
相关论文
共 50 条
  • [1] A new algorithm-independent method for privacy-preserving data mining
    Li, G. (hit6006@126.com), 1600, Binary Information Press (10): : 1473 - 1480
  • [2] A Privacy-Preserving Classification Method Based on Singular Value Decomposition
    Li, Guang
    Wang, Yadong
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (06) : 529 - 534
  • [3] Privacy-Preserving Associative Classification
    Priyanka, Garach
    Darshana, Patel
    Radhika, Kotecha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 245 - 251
  • [4] Research On Suspicious Financial Transactions Recognition Based On Privacy-Preserving Of Classification Algorithm
    Ju, Chunhua
    Zheng, Lili
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 525 - 528
  • [5] An Efficient Privacy-Preserving Classification Method with Condensed Information
    Li, Xinning
    Zhou, Zhiping
    IMAGE AND GRAPHICS (ICIG 2017), PT III, 2017, 10668 : 551 - 562
  • [6] Consensus-Based Privacy-Preserving Algorithm
    Li, Heng
    Xu, Fangfang
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1676 - 1684
  • [7] An Efficient Algorithm for Frequent Pattern Mining based on Privacy-preserving
    Zhang, Yaling
    Wang, Ting
    Wang, Shangping
    2017 13TH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (ICNC-FSKD), 2017,
  • [8] Distributed Privacy-preserving Data Mining Method Research
    Chen, Qi
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 88 - 90
  • [9] Privacy-Preserving Data Mining Based on Sample Selection and Singular Value Decomposition
    Li, Guang
    Wang, Yadong
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 278 - 281
  • [10] Privacy-preserving collaborative filtering algorithm based on local differential privacy
    Bao, Ting
    Xu, Lei
    Zhu, Liehuang
    Wang, Lihong
    Li, Ruiguang
    Li, Tielei
    CHINA COMMUNICATIONS, 2021, 18 (11) : 42 - 60