期刊文献+

一种新的K均值挖掘的隐私保护算法

A New K-mean Mining Algorithm for Privacy Protection
下载PDF
导出
摘要 对隐私保护数据挖掘算法进行了深入研究和分析。总结出目前研究的缺点,提出了一种新的K均值数据挖掘的隐私保护算法,通过与已有隐私保护算法的比较,在保证不减少隐私强度的情况下,提高了挖掘的精度。 This paper describes the technologies about data mining for privacy protection and proposes a new K-mean data mining algorithm based on summarizing the disadvantages.Comparing to the existing algorithms,it increases mining accuracy in the condition of ensuring privacy protection strength.
出处 《长春大学学报》 2011年第10期27-29,共3页 Journal of Changchun University
关键词 K均值 数据挖掘 隐私保护 WEKA K-mean data mining privacy-preserving WEKA
  • 相关文献

参考文献3

  • 1马进,李锋,李建华.分布式数据挖掘中基于扰乱的隐私保护方法[J].浙江大学学报(工学版),2010,44(2):276-282. 被引量:10
  • 2Li Liu, Murat Kantarcioglu, Bhavani Thuraisingham. Privacy Preserving Decision Tree mining from Perturbed Data[ J]. In proceedings of 42th Ha- waii International Conference on System Sciences. 2009.
  • 3K. Chen, G. Sun, and L. Liu. Towards attack-resilient geometric data perturbation[ J ]. In Proceedings of the 2007 SIAM International Conference on Data Mining( SDM' 07 ) , Minneapolis, MN, April 2007 : 589 - 592.

二级参考文献17

  • 1CRANOR L F. Web privacy with P3P [M]. Sebastopol: O'Reilly, 2002:3 - 11.
  • 2O'HERRIN J K, FOST N, KUDSK K A. Health insurance portability accountability act (HIPAA) regulations: effect on medical record research [J]. Annals of Surgery, 2004, 239(6): 772.
  • 3CAN/CSA-Q830-96. Privacy code[S]. Canada: [s.n.] , 1997.
  • 4AGRAWAL R, SRIKANT R. Privacy-preserving data mining [J]. ACM Sigmod Record, 2000, 29(2): 439-450.
  • 5EVFIMIEVSKI A, SRIKANT R, AGRAWAL R, et al. Privacy preserving mining of association rules [J]. Information Systems, 2002, 29(4) :343 - 364.
  • 6FIENBERG S. E, MCINTYRE J. Data swapping: variations on a theme by Dalenius and Reiss [J3. Privacy in Statistical Databases, 2004, 3050: 14 - 29.
  • 7SWEENEY L. Achieving k-anonymity privacy protection using generalization and suppression[J]. International Journal on Uncertainty, Fuzziness and Knowledgebased Systems, 2002, 10(5) : 571 - 588.
  • 8CHAWLA S, DWORK C, MCSHERRY F, et al. Toward privacy in public databases [C]//The 2rid Theory of Cryptography Conference. Cambridge: Springer, 2005 :363 - 385.
  • 9YAO A C C. How to generate and exchange secrets [C]// Proceedings of the 27th Annual Symposium on Foundations of Computer Science. Toronto: IEEE, 1986: 162 - 167.
  • 10BEAVER D, Foundations of secure interactive computing [C]// Advances in Cryptology. Santa Barbara: Springer, 1991:377 - 391.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部