期刊文献+

信息安全在数据挖掘中的应用 被引量:1

Application of Information Security on Data Mining
下载PDF
导出
摘要 隐私保密是数据挖掘应用中正迅速发展的研究领域。重点讨论了数据保密的两种方法:值—类成员关系、值变形,并在此基础上给出了保密程度量化的确定。数据挖掘的任务是研究并提出整合数据的模型,文中利用贝叶斯规则重构数据的原始分布,并将此方法应用于决策树的生成,得到了3种构建决策树的算法:全局算法、分类算法、局部算法,并且通过理论分析得出局部算法和分类算法比全局算法的效率高。 Privacy preserving is a new and rapidly emerging research area in data mining. Mainly discusses the two methods applied in data mining: value- class membership and value distortion, and forwards the quantifying privacy. The primary task in data mining is the development of models about aggregated data,so it makes use of Bayes' rules to reconstruct the original distribution. And it considers the three different algorithms that differ in when and how distributions are reconstructed: glohal, byclass, local. Finally, it analyses the execution time of three algorithms, and concludes that global's efficiency is the lowest,and byclass falls in between global and local.
作者 吕品 孙宝林
出处 《微机发展》 2005年第10期4-5,25,共3页 Microcomputer Development
基金 湖北省教育厅重点科研项目(2003A002)
关键词 数据挖掘 随机化 重构 data mining randomize reconstruction
  • 相关文献

参考文献9

  • 1Fayyad U M,Piatetsky- Shaperio G,Smyth P,et al.Advances in Knowledge Discovery and Data Mining[ M].[ s.l.] :AAAI/MIT Press, 1996.
  • 2Jacobs R.Increased rates of convergence through learning rate adaptafon[ J ].Neural Networks, 1988 (1): 295 - 307.
  • 3Mehta M,Agrawal R,Rissanen J.SLIQ: A fast scalable classifier for data mining[A].In Proc.1996 Int.Conf.Extending Database Technology[C].Avignon, France: [s.n.],1996.
  • 4Breunig M, Hans- Peter K, Raymond T.IOF: Identifying Density- Based Local Outliers[A].ACM SIGMOD Conference[C] .Dallas, Texas, USA: [s.n.] ,2000.93 - 104.
  • 5Agrawal R,Srikant R.Privacy- Preserving Data Mining[A].ACM SIGMOD Int Conf.on Management of Data[ C].Dallas, Texas,USA:[s.n.] ,2000.
  • 6Agrawal R, Gehrke J, Gunopulos D, et al.Automatic subspace clustering of high- dimensional data for data mining applications[J].ACM SIGMOD, 1998,27(2) :94 - 105.
  • 7Agrawal R,Bayardo R J,Faloutsos C, et al.Auditing Compliance with a Hippocratic Database[A].30th Int'l Conf.on Very Large Data Bases[C].Toronto, Canada: [s.n.] ,2004.
  • 8LeFevre K,Agrawal R, Ercegovac V, et al.Limiting Disclosure in Hippocratic Databases[A].30th Int'l Conf.on Very Large Data Bases[C].Toronto, Canada: [s.n.] ,2004.
  • 9Evfimievski A,Srikant R,Agrawal R,et al.Privacy- Preserving Mining of Association Rules[A].In Proc.Of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].[s.l.]: ACM Press,2002.217 -228.

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部