A new algorithm-independent method for privacy-preserving classification based on sample generation

被引:0
作者
School of Electronic and Control Engineering, Chang’an University, Xi’an [1 ]
Shaanxi
710064, China
机构
[1] School of Electronic and Control Engineering, Chang’an University, Xi’an, 710064, Shaanxi
来源
Open. Cybern. Syst. J. | / 1卷 / 443-447期
基金
中国国家自然科学基金;
关键词
Data mining; Data perturbation; Privacy preserving;
D O I
10.2174/1874110X01509010443
中图分类号
学科分类号
摘要
With the development of data mining technologies, privacy protection is becoming a challenge for data mining applications in many fields. To solve this problem, many PPDM (privacy-preserving data mining) methods have been proposed. One important type of PPDM method is based on data perturbation. Only part of the data-perturbation-based methods is algorithm-irrelevant, which are favorable because common data mining algorithms can be used directly. This paper proposes a new algorithm-irrelevant PPDM method for classification based on sample generation. This method is a data-perturbation-based method and has three steps. First, it trains classifiers use the original data. Then, it generates new samples as the perturbed data randomly. Finally, it use the classifiers trained in the first step to predict these samples’ category. The experiments show that this new method can produce usable data while protecting privacy well. © Li and Xi.
引用
收藏
页码:443 / 447
页数:4
相关论文
共 50 条
  • [41] Lightweight Privacy-Preserving Ensemble Classification for Face Recognition
    Ma, Zhuo
    Liu, Yang
    Liu, Ximeng
    Ma, Jianfeng
    Ren, Kui
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 5778 - 5790
  • [42] Privacy-Preserving Text Classification on Deep Neural Network
    Li, Kunhong
    Huang, Ruwei
    Yang, Bo
    NEURAL PROCESSING LETTERS, 2025, 57 (02)
  • [43] Privacy-Preserving Image Classification Using Vision Transformer
    Qi, Zheng
    MaungMaung, AprilPyone
    Kinoshita, Yuma
    Kiya, Hitoshi
    2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 543 - 547
  • [44] Privacy-preserving trajectory similarity computation method
    Yu H.
    Zhang H.
    Yu X.
    Qu J.
    Ge M.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (11): : 1 - 13
  • [45] A Kind of Privacy-Preserving Data Mining Algorithm Oriented to Data User
    Cai, Li
    Su, JianYing
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 2, 2011, 129 : 25 - +
  • [46] Privacy Preserving Classification Algorithm Based on Random Multidimensional Scales
    Lu, Wei
    Jiang, Yi-ping
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 406 - 409
  • [47] Privacy-Preserving Synthetic Data Generation for Recommendation Systems
    Liu, Fan
    Cheng, Zhiyong
    Chen, Huilin
    Wei, Yinwei
    Nie, Liqiang
    Kankanhalli, Mohan
    PROCEEDINGS OF THE 45TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '22), 2022, : 1379 - 1389
  • [48] A Privacy-Preserving Blockchain-Based Method to Optimize Energy Trading
    Ping, Jian
    Yan, Zheng
    Chen, Sijie
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1148 - 1157
  • [49] An Enhanced Privacy-preserving Method Based on K-automorphism Mode
    Zhang, L. J.
    Zhang, Y. H.
    Zhang, J. P.
    Yang, J.
    Guo, L.
    INTERNATIONAL CONFERENCE ON ADVANCES IN MANAGEMENT ENGINEERING AND INFORMATION TECHNOLOGY (AMEIT 2015), 2015, : 224 - 232
  • [50] A Novel Method Of Privacy-preserving based on Compressive Sensing for Big Data
    Lyu, Denglong
    Zhu, Shibing
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 593 - 601