Privacy Preserving Classification By Using Modified C4.5

被引:0
作者
Baghel, Ranjan [1 ]
Dutta, Maitreyee [1 ]
机构
[1] Natl Inst Tech Teachers Training & Res, Dept Comp Sci & Engn, Chandigarh, India
来源
2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3) | 2013年
关键词
Privacy; Classification; PPDM; C4.5; Data Mining;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Protecting the datasets supplied to third parties for data mining purposes is essential so that these datasets cannot be used for secondary purposes. C4.5 is a classification algorithm which works on mixed datasets. Data perturbation is an important technique in data privacy. This paper proposes a modified C4.5 which uses perturbed and unrealized datasets for classification. The decision tree is built by using the gain ratio as the split criteria and it is computed using the unreal and perturbed datasets. Experimental results are obtained by simulation in Weka.
引用
收藏
页码:124 / 129
页数:6
相关论文
共 50 条
[41]   AdaptativeCC4.5: Credal C4.5 with a rough class noise estimator [J].
Abelian, Joaquin ;
Mantas, Carlos J. ;
Castellano, Javier G. .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 92 :363-379
[42]   Privacy-Preserving Classification of Data Streams [J].
Chao, Ching-Ming ;
Chen, Po-Zung ;
Sun, Chu-Hao .
JOURNAL OF APPLIED SCIENCE AND ENGINEERING, 2009, 12 (03) :321-330
[43]   Privacy preserving classification based on randomization and reconstruction [J].
Zhang, Peng ;
Tong, Yunhai ;
Tang, Shiwei ;
Yang, Dongqing .
DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 :166-173
[44]   Privacy-preserving naive Bayesian classification [J].
Zhan, Z ;
Chang, LW ;
Matwin, S .
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, :14-20
[45]   Privacy-preserving Naive Bayes classification [J].
Vaidya, Jaideep ;
Kantarcioglu, Murat ;
Clifton, Chris .
VLDB JOURNAL, 2008, 17 (04) :879-898
[46]   Fast Numerical Threshold Search Algorithm for C4.5 [J].
Chong, Wen-Mau ;
Goh, Chien-Le ;
Bau, Yoon-Teck ;
Lee, Kian-Chin .
2014 IIAI 3RD INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2014), 2014, :930-935
[47]   Application of C4.5 decision tree for scholarship evaluations [J].
Wang, X. ;
Zhou, C. ;
Xu, X. .
10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 :179-184
[48]   Research on Application of C4.5 Algorithm in Performance Analysis [J].
Lu, Kai ;
Chen, Mingrui .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 :290-294
[49]   The Application of C4.5 Algorithm in the Analysis of Police Training [J].
Zhe, Chen .
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING (AMCCE 2017), 2017, 118 :506-511
[50]   Using homomorphic encryption for privacy-preserving collaborative decision tree classification [J].
Zhan, Justin .
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, :637-645