A new algorithm-independent method for privacy-preserving classification based on sample generation

被引:0
|
作者
School of Electronic and Control Engineering, Chang’an University, Xi’an [1 ]
Shaanxi
710064, China
机构
来源
Open. Cybern. Syst. J. | / 1卷 / 443-447期
基金
中国国家自然科学基金;
关键词
Classification (of information) - Perturbation techniques - Privacy-preserving techniques;
D O I
10.2174/1874110X01509010443
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method for classification based on sample generation. This method is a data-perturbation-based method and has three steps. First, it trains classifiers use the original data. Then, it generates new samples as the perturbed data randomly. Finally, it use the classifiers trained in the first step to predict these samples’ category. The experiments show that this new method can produce usable data while protecting privacy well. © Li and Xi.
引用
收藏
相关论文
共 50 条
  • [1] A new algorithm-independent method for privacy-preserving data mining
    Li, G. (hit6006@126.com), 1600, Binary Information Press (10):
  • [2] A privacy-preserving classification mining algorithm
    Ge, WP
    Wang, W
    Li, XR
    Shi, B
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 256 - 261
  • [3] A Privacy-Preserving Classification Method Based on Singular Value Decomposition
    Li, Guang
    Wang, Yadong
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (06) : 529 - 534
  • [4] Privacy-Preserving KNN Classification Algorithm for Smart Grid
    Song, Zhuhuan
    Ren, Yanli
    He, Gang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [5] Research On Suspicious Financial Transactions Recognition Based On Privacy-Preserving Of Classification Algorithm
    Ju, Chunhua
    Zheng, Lili
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 525 - 528
  • [6] Privacy-Preserving Associative Classification
    Priyanka, Garach
    Darshana, Patel
    Radhika, Kotecha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 245 - 251
  • [7] Privacy-preserving SVM classification
    Jaideep Vaidya
    Hwanjo Yu
    Xiaoqian Jiang
    Knowledge and Information Systems, 2008, 14 : 161 - 178
  • [8] Consensus-Based Privacy-Preserving Algorithm
    Li, Heng
    Xu, Fangfang
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1676 - 1684
  • [9] An Efficient Privacy-Preserving Classification Method with Condensed Information
    Li, Xinning
    Zhou, Zhiping
    IMAGE AND GRAPHICS (ICIG 2017), PT III, 2017, 10668 : 551 - 562
  • [10] Privacy-preserving SVM classification
    Vaidya, Jaideep
    Yu, Hwanjo
    Jiang, Xiaoqian
    KNOWLEDGE AND INFORMATION SYSTEMS, 2008, 14 (02) : 161 - 178