Output Privacy Protection With Pattern-Based Heuristic Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Output Privacy Protection With Pattern-Based Heuristic Algorithm

Privacy Preserving Data Mining(PPDM) is an ongoing research area aimed at bridging the gap between the collaborative data mining and data confidentiality There are many different approaches which have been adopted for PPDM, of them the rule hiding approach is used in this article. This approach ensures output privacy that prevent the mined patterns(itemsets) from malicious inference problems. A...

متن کامل

Algorithm-irrelevant Privacy Protection Method Based on Randomization

Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...

متن کامل

µ-Fractal Based Data Perturbation Algorithm For Privacy Protection

Many organizations publish anonymous medical data for sociology research, health research, education and other useful studies. Although attributes that clearly identify individuals, such as name and certain personal identity numbers are removed, the combination of some other information, like the date of birth, gender, post-code etc. can still be used to identify an individual. Existing data pe...

متن کامل

A Hybrid Meta-Heuristic Algorithm based on Imperialist Competition Algorithm

The human has always been to find the best in all things. This Perfectionism has led to the creation of optimization methods. The goal of optimization is to determine the variables and find the best acceptable answer Due to the limitations of the problem, So that the objective function is minimum or maximum. One of the ways inaccurate optimization is meta-heuristics so that Inspired by nature, ...

متن کامل

Location privacy protection algorithm for mobile networks

Mobile users often post nearest neighbor queries based on their current location. Usually, the mobile terminal (user) sends a request to query an untrusted location server, including the position information of the mobile terminal requests, thus leading to the disclosure of one’s location. For mobile users providing location services, the privacy of mobile users is crucial. This demand is parti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Science and Information Technology

سال: 2014

ISSN: 0975-4660,0975-3826

DOI: 10.5121/ijcsit.2014.6210