0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
Classification and Evaluation of Privacy Preserving Data Mining Methods
نویسندگان :
Negar Nasiri
1
Mohammadreza Keyvanpour
2
1- دانشگاه الزهرا(س)
2- دانشگاه الزهرا(س)
کلمات کلیدی :
Information, Privacy, Data Mining, Privacy preserving Data Mining, PPDM
چکیده :
Abstract— In the recently age, the volume of information is growing exponentially. This data can be used in various fields such as business, healthcare, cyber security, etc. Extracting useful knowledge from raw information is an important process. But the challenge in this process is the sensitivity of this information, which has made owners reluctant to share their information. This has led the study of the privacy of data in data mining to be a hot topic today. In this paper, an attempt is made to provide a framework for qualitative analysis of methods. This qualitative framework consists of three main sections: a comprehensive classification of proposed methods, proposed evaluation criteria and their qualitative evaluation. Our main purpose of presenting this framework is 1) systematic introduction of the most important methods of privacy preserving in data mining 2) creating a suitable platform for qualitative comparison of these methods 3) providing the possibility of selecting methods appropriate to the needs of application areas 4) systematic introduction of points Weakness of existing methods as a prerequisite for improving methods of PPDM.
لیست مقالات
لیست مقالات بایگانی شده
ارائه مدل یادگیری ماشین برای پیشبینی سریزمانی باینری از دیدگاه مسئلههای دستهبندی با کاربرد در پیشبینی نتهای موسیقی
نیلوفر ع��دلخانی - حسام عمرانپور
Human Resource Allocation to the Credit Requirement Process, A Process Mining Approach
Omid Mahdi Ebadati - Mohammad Mehrabioun - Shokoofeh Sadat Hosseini
Low-Power Phase-Based Stochastic MAC for FPGA
Kooroush Manochehri - Amir arsalan Sakhtianchi - Mehrshad Khosraviani
Classical-Quantum Multiple Access Wiretap Channel with Common Message: One-shot Rate Region
Hadi Aghaee - Dr Bahareh Akhbari
ارائه یک رویکرد معنایی مبتنی بر آنتولوژی به منظور شناسایی تاکتیکهای معماری
احسان شریفی - دکتر احمد عبدالله زاده بارفروش
Experimental analysis of automated negotiation agents in modeling Gaussian bidders
Fatemeh Hassanvand - Dr Faria Nassiri-Mofakham
Video Steganography in HEVC Using Intra-Prediction Modes
Vahidreza Seirafian - Masoud Omomi
Reinforced Detection: Deep Reinforcement Learning for Binary VoIP Classification in Encrypted Traffic
Mohsen Rajabpour - Mohammadmoein Asefi - Siavash Khorsandi
An Attention-Enhanced Hybrid Deep Learning Framework for Detecting Denial-of-Wallet Attacks in Serverless Platforms
Mohammad Mehmandoost - HadiShahriar Shahhoseini
User Preferences Elicitation in Bilateral Automated Negotiation Using Recursive Least Square Estimation
Farnaz Salmanian - Dr Hamid Jazayeri - Dr Javad Kazemitabar
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.2