0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Classification and Evaluation of Privacy Preserving Data Mining Methods
نویسندگان :
Negar Nasiri
1
Mohammadreza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
کلمات کلیدی :
Information, Privacy, Data Mining, Privacy preserving Data Mining, PPDM
چکیده :
Abstract— In the recently age, the volume of information is growing exponentially. This data can be used in various fields such as business, healthcare, cyber security, etc. Extracting useful knowledge from raw information is an important process. But the challenge in this process is the sensitivity of this information, which has made owners reluctant to share their information. This has led the study of the privacy of data in data mining to be a hot topic today. In this paper, an attempt is made to provide a framework for qualitative analysis of methods. This qualitative framework consists of three main sections: a comprehensive classification of proposed methods, proposed evaluation criteria and their qualitative evaluation. Our main purpose of presenting this framework is 1) systematic introduction of the most important methods of privacy preserving in data mining 2) creating a suitable platform for qualitative comparison of these methods 3) providing the possibility of selecting methods appropriate to the needs of application areas 4) systematic introduction of points Weakness of existing methods as a prerequisite for improving methods of PPDM.
لیست مقالات
لیست مقالات بایگانی شده
A Demand Response Schema in Industry: Smart Scheduling Approach for Industrial Processes
Negin Shafinezhad - Hamid Abrishami - Maryam Mahmoodi
پیشبینی بستری مجدد بیماران با استفاده از استخراج مفاهیم زیستپزشکی از متون بالینی
فهیمه شاهرخ شهرکی - رسول سامانی - دکتر ناصر قدیری فهیمه شاهرخ شهرکی - رسول سامانی - ناصر قدیری -
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Masoumeh Hashemi - Mehdi Sakhaei-nia - Morteza Yousef Sanati
A Multi Objective & Trust-Based Workflow Scheduling Method In Cloud Computing Based On The MVO Algorithm
Fatemeh Ebadifard
Optimal control of robotic hand for rehabilitation using fractional order systems and EEG signal processing
Mehran Safari Dehnavi - Vahid Safari Dehnavi - Masoud Shafiee
A Novel Resource Allocation Scheme for Underlaying NOMA-Based Multi-Channel Cognitive D2D Communications
Anahita Akbari - Dr Javad Zeraatkar Moghaddam - Dr Mehrdad Ardebilipour
پیشبینی حجم ترافیک شهری با استفاده از دادههای سرویس نشان مورد مطالعاتی: خیابان کمال اصفهان
مهسا لطیفی - جمشید مالکی
COVID-19 Image Retrieval Using Siamese Deep Neural Network and Hashing Technique
Farsad Zamani Boroujeni - Doryaneh Hossein Afshari - Fatemeh Mahmoodi
مروری بر تشخیص جامعه در شبکه های اجتماعی
صفورا اخلاقی - محمدباقر منهاج - بهروز معصومی
Design and Simulation of a New Multiplexer with Energy Analysis in Quantum Cellular Automata Technology
- - -
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2