期刊文献+
共找到34,078篇文章
< 1 2 250 >
每页显示 20 50 100
PARE:Privacy-Preserving Data Reliability Evaluation for Spatial Crowdsourcing in Internet of Things
1
作者 Peicong He Yang Xin Yixian Yang 《Computers, Materials & Continua》 SCIE EI 2024年第8期3067-3084,共18页
The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters... The proliferation of intelligent,connected Internet of Things(IoT)devices facilitates data collection.However,task workers may be reluctant to participate in data collection due to privacy concerns,and task requesters may be concerned about the validity of the collected data.Hence,it is vital to evaluate the quality of the data collected by the task workers while protecting privacy in spatial crowdsourcing(SC)data collection tasks with IoT.To this end,this paper proposes a privacy-preserving data reliability evaluation for SC in IoT,named PARE.First,we design a data uploading format using blockchain and Paillier homomorphic cryptosystem,providing unchangeable and traceable data while overcoming privacy concerns.Secondly,based on the uploaded data,we propose a method to determine the approximate correct value region without knowing the exact value.Finally,we offer a data filtering mechanism based on the Paillier cryptosystem using this value region.The evaluation and analysis results show that PARE outperforms the existing solution in terms of performance and privacy protection. 展开更多
关键词 Spatial crowdsourcing privacy-preserving data evaluation IOT blockchain
下载PDF
Distributed anonymous data perturbation method for privacy-preserving data mining 被引量:4
2
作者 Feng LI Jin MA Jian-hua LI 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第7期952-963,共12页
Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed s... Privacy is a critical requirement in distributed data mining. Cryptography-based secure multiparty computation is a main approach for privacy preserving. However, it shows poor performance in large scale distributed systems. Meanwhile, data perturbation techniques are comparatively efficient but are mainly used in centralized privacy-preserving data mining (PPDM). In this paper, we propose a light-weight anonymous data perturbation method for efficient privacy preserving in distributed data mining. We first define the privacy constraints for data perturbation based PPDM in a semi-honest distributed environment. Two protocols are proposed to address these constraints and protect data statistics and the randomization process against collusion attacks: the adaptive privacy-preserving summary protocol and the anonymous exchange protocol. Finally, a distributed data perturbation framework based on these protocols is proposed to realize distributed PPDM. Experiment results show that our approach achieves a high security level and is very efficient in a large scale distributed environment. 展开更多
关键词 privacy-preserving data mining (PPDM) Distributed data mining data perturbation
原文传递
A Quarterly High RFM Mining Algorithm for Big Data Management
3
作者 Cuiwei Peng Jiahui Chen +1 位作者 Shicheng Wan Guotao Xu 《Computers, Materials & Continua》 SCIE EI 2024年第9期4341-4360,共20页
In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf ava... In today’s highly competitive retail industry,offline stores face increasing pressure on profitability.They hope to improve their ability in shelf management with the help of big data technology.For this,on-shelf availability is an essential indicator of shelf data management and closely relates to customer purchase behavior.RFM(recency,frequency,andmonetary)patternmining is a powerful tool to evaluate the value of customer behavior.However,the existing RFM patternmining algorithms do not consider the quarterly nature of goods,resulting in unreasonable shelf availability and difficulty in profit-making.To solve this problem,we propose a quarterly RFM mining algorithmfor On-shelf products named OS-RFM.Our algorithmmines the high recency,high frequency,and high monetary patterns and considers the period of the on-shelf goods in quarterly units.We conducted experiments using two real datasets for numerical and graphical analysis to prove the algorithm’s effectiveness.Compared with the state-of-the-art RFM mining algorithm,our algorithm can identify more patterns and performs well in terms of precision,recall,and F1-score,with the recall rate nearing 100%.Also,the novel algorithm operates with significantly shorter running times and more stable memory usage than existing mining algorithms.Additionally,we analyze the sales trends of products in different quarters and seasonal variations.The analysis assists businesses in maintaining reasonable on-shelf availability and achieving greater profitability. 展开更多
关键词 data mining recency pattern high-utility itemset RFM pattern mining on-shelf management
下载PDF
A systematic study of Erzhu Erchen decoction against damp-heat internalized type 2 diabetes based on data mining and experimental verification
4
作者 Peng-Yu Wang Jian-Fen Shen +4 位作者 Shuo Zhang Qing Lan Guan-Di Ma Tong Wang You-Zhi Zhang 《Traditional Medicine Research》 2024年第2期27-41,共15页
Background:Erzhu Erchen decoction(EZECD),which is based on Erchen decoction and enhanced with Atractylodes lancea and Atractylodes macrocephala,is widely used for the treatment of dampness and heat(The clinical manife... Background:Erzhu Erchen decoction(EZECD),which is based on Erchen decoction and enhanced with Atractylodes lancea and Atractylodes macrocephala,is widely used for the treatment of dampness and heat(The clinical manifestations of Western medicine include thirst,inability to drink more,diarrhea,yellow urine,red tongue,et al.)internalized disease.Nevertheless,the mechanism of EZECD on damp-heat internalized Type 2 diabetes(T2D)remains unknown.We employed data mining,pharmacology databases and experimental verification to study how EZECD treats damp-heat internalized T2D.Methods:The main compounds or genes of EZECD and damp-heat internalized T2D were obtained from the pharmacology databases.Succeeding,the overlapped targets of EZECD and damp-heat internalized T2D were performed by the Gene Ontology,kyoto encyclopedia of genes and genomes analysis.And the compound-disease targets-pathway network were constructed to obtain the hub compound.Moreover,the hub genes and core related pathways were mined with weighted gene co-expression network analysis based on Gene Expression Omnibus database,the capability of hub compound and genes was valid in AutoDock 1.5.7.Furthermore,and violin plot and gene set enrichment analysis were performed to explore the role of hub genes in damp-heat internalized T2D.Finally,the interactions of hub compound and genes were explored using Comparative Toxicogenomics Database and quantitative polymerase chain reaction.Results:First,herb-compounds-genes-disease network illustrated that the hub compound of EZECD for damp-heat internalized T2D could be quercetin.Consistently,the hub genes were CASP8,CCL2,and AHR according to weighted gene co-expression network analysis.Molecular docking showed that quercetin could bind with the hub genes.Further,gene set enrichment analysis and Gene Ontology represented that CASP8,or CCL2,is negatively involved in insulin secretion response to the TNF or lipopolysaccharide process,and AHR or CCL2 positively regulated lipid and atherosclerosis,and/or including NOD-like receptor signaling pathway,and TNF signaling pathway.Ultimately,the quantitative polymerase chain reaction and western blotting analysis showed that quercetin could down-regulated the mRNA and protein experssion of CASP8,CCL2,and AHR.It was consistent with the results in Comparative Toxicogenomics Database databases.Conclusion:These results demonstrated quercetin could inhibit the expression of CASP8,CCL2,AHR in damp-heat internalized T2D,which improves insulin secretion and inhibits lipid and atherosclerosis,as well as/or including NOD-like receptor signaling pathway,and TNF signaling pathway,suggesting that EZECD may be more effective to treat damp-heat internalized T2D. 展开更多
关键词 data mining damp-heat internalized type 2 diabetes Erzhu Erchen decoction network pharmacology BIOINFORMATICS
下载PDF
Data Mining Based Research of Development Direction of Waist Protection Equipment
5
作者 Lingfeng ZHU Zhizhen LU +3 位作者 Haijie YU Haifen YING Zheming LI Huashan FAN 《Medicinal Plant》 2024年第2期84-90,共7页
[Objectives]To explore the trend of brands towards the design of waist protection products through data mining,and to provide reference for the design concept of the contour of waist protection pillow.[Methods]The str... [Objectives]To explore the trend of brands towards the design of waist protection products through data mining,and to provide reference for the design concept of the contour of waist protection pillow.[Methods]The structural design information of all waist protection equipment was collected from the national Internet platform,and the data were classified and a database was established.IBM SPSS 26.0 and MATLAB 2018a were used to analyze the data and tabulate them in Tableau 2022.4.After the association rules were clarified,the data were imported into Cinema 4D R21 to create the concept contour of waist protection pillow.[Results]The average and standard deviation of the single airbag design were the highest in all groups,with an average of 0.511 and a standard deviation of 0.502.The average and standard deviation of the upper and lower dual airbags were the lowest in all groups,with an average of 0.015 and a standard deviation of 0.120;the correlation coefficient between single airbag and 120°arc stretching was 0.325,which was positively correlated with each other(P<0.01);the correlation coefficient between multiple airbags and 360°encircling fitting was 0.501,which was positively correlated with each other and had the highest correlation degree(P<0.01).[Conclusions]The single airbag design is well recognized by companies,and has received the highest attention among all brand products.While focusing on single airbag design,most brands will consider the need to add 120°arc stretching elements in product design.At the time of focusing on multiple airbag design,some brands believe that 360°encircling fitting elements need to be added to the product,and the correlation between the two is the highest among all groups. 展开更多
关键词 SPINE Low back pain data mining AIRBAG STRETCHING Fitting Steel plate support Bidirectional compression Conceptual contour Design
下载PDF
Forecasting the Academic Performance by Leveraging Educational Data Mining
6
作者 Mozamel M.Saeed 《Intelligent Automation & Soft Computing》 2024年第2期213-231,共19页
The study aims to recognize how efficiently Educational DataMining(EDM)integrates into Artificial Intelligence(AI)to develop skills for predicting students’performance.The study used a survey questionnaire and collec... The study aims to recognize how efficiently Educational DataMining(EDM)integrates into Artificial Intelligence(AI)to develop skills for predicting students’performance.The study used a survey questionnaire and collected data from 300 undergraduate students of Al Neelain University.The first step’s initial population placements were created using Particle Swarm Optimization(PSO).Then,using adaptive feature space search,Educational Grey Wolf Optimization(EGWO)was employed to choose the optimal attribute combination.The second stage uses the SVMclassifier to forecast classification accuracy.Different classifiers were utilized to evaluate the performance of students.According to the results,it was revealed that AI could forecast the final grades of students with an accuracy rate of 97%on the test dataset.Furthermore,the present study showed that successful students could be selected by the Decision Tree model with an efficiency rate of 87.50%and could be categorized as having equal information ratio gain after the semester.While the random forest provided an accuracy of 28%.These findings indicate the higher accuracy rate in the results when these models were implemented on the data set which provides significantly accurate results as compared to a linear regression model with accuracy(12%).The study concluded that the methodology used in this study can prove to be helpful for students and teachers in upgrading academic performance,reducing chances of failure,and taking appropriate steps at the right time to raise the standards of education.The study also motivates academics to assess and discover EDM at several other universities. 展开更多
关键词 Academic achievement AI algorithms CLASSIFIERS data mining deep learning
下载PDF
Integrated data mining and network pharmacology to discover a novel traditional Chinese medicine prescription against diabetic retinopathy and reveal its mechanism
7
作者 Kai-Lun Zhang Xu Wang +7 位作者 Xiang-Wei Chang Jun-Fei Gu Bo-Yang Zhu Shi-Bing Wei Bo Wu Can Peng Jiu-Sheng Nie De-Ling Wu 《TMR Modern Herbal Medicine》 CAS 2024年第2期41-55,共15页
Background:Diabetic retinopathy(DR)is currently the leading cause of blindness in elderly individuals with diabetes.Traditional Chinese medicine(TCM)prescriptions have shown remarkable effectiveness for treating DR.Th... Background:Diabetic retinopathy(DR)is currently the leading cause of blindness in elderly individuals with diabetes.Traditional Chinese medicine(TCM)prescriptions have shown remarkable effectiveness for treating DR.This study aimed to screen a novel TCM prescription against DR from patents and elucidate its medication rule and molecular mechanism using data mining,network pharmacology,molecular docking and molecular dynamics(MD)simulation.Method:TCM prescriptions for treating DR was collected from patents and a novel TCM prescription was identified using data mining.Subsequently,the mechanism of the novel TCM prescription against DR was explored by constructing a network of core TCMs-core active ingredients-core targets-core pathways.Finally,molecular docking and MD simulation were employed to validate the findings from network pharmacology.Result:The TCMs of the collected prescriptions primarily possessed bitter and cold properties with heat-clearing and supplementing effects,attributed to the liver,lung and kidney channels.Notably,a novel TCM prescription for treating DR was identified,composed of Lycii Fructus,Chrysanthemi Flos,Astragali Radix and Angelicae Sinensis Radix.Twenty core active ingredients and ten core targets of the novel TCM prescription for treating DR were screened.Moreover,the novel TCM prescription played a crucial role for treating DR by inhibiting inflammatory response,oxidative stress,retinal pigment epithelium cell apoptosis and retinal neovascularization through various pathways,such as the AGE-RAGE signaling pathway in diabetic complications and the MAPK signaling pathway.Finally,molecular docking and MD simulation demonstrated that almost all core active ingredients exhibited satisfactory binding energies to core targets.Conclusions:This study identified a novel TCM prescription and unveiled its multi-component,multi-target and multi-pathway characteristics for treating DR.These findings provide a scientific basis and novel insights into the development of drugs for DR prevention and treatment. 展开更多
关键词 TCM prescriptions diabetic retinopathy medication rule molecular mechanism data mining network pharmacology molecular docking
下载PDF
Detection of Knowledge on Social Media Using Data Mining Techniques
8
作者 Aseel Abdullah Alolayan Ahmad A. Alhamed 《Open Journal of Applied Sciences》 2024年第2期472-482,共11页
In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), s... In light of the rapid growth and development of social media, it has become the focus of interest in many different scientific fields. They seek to extract useful information from it, and this is called (knowledge), such as extracting information related to people’s behaviors and interactions to analyze feelings or understand the behavior of users or groups, and many others. This extracted knowledge has a very important role in decision-making, creating and improving marketing objectives and competitive advantage, monitoring events, whether political or economic, and development in all fields. Therefore, to extract this knowledge, we need to analyze the vast amount of data found within social media using the most popular data mining techniques and applications related to social media sites. 展开更多
关键词 data mining KNOWLEDGE data mining Techniques Social Media
下载PDF
Aviation Safety and Data Mining in Marketing Dimension
9
作者 Sevgi Adigüzel Murat Başal Emel Saraç 《Advances in Aerospace Science and Technology》 2024年第3期117-127,共11页
The aviation industry is a sector that is developing, changing and growing every day in terms of technological and legal framework. There are generally three factors that enable airlines to hold on to the market. Thes... The aviation industry is a sector that is developing, changing and growing every day in terms of technological and legal framework. There are generally three factors that enable airlines to hold on to the market. These factors are safety, service quality and price. Airline companies can analyze the customers in the market with a focus on price and quality and develop a business model according to their expectations. For example, business class and economy class passenger expectations are different from each other, so the service and price to be offered to them will be different. However, all customers have one common expectation and that is safety. No matter how high quality the service is or how cheap the price is, no one wants to fly with an airline or plane that is not safe. From an airline company’s point of view, an accident or breakdown of one of the company’s aircraft can cause irreparable image loss and financial damage. If we look at past examples, we see that there are many airline companies or maintenance organizations that could not recover after an accident and went bankrupt. Safety is an indispensable factor. Therefore, there is a unit in the sector called the safety management system (SMS), which collects data by taking a proactive and reactive approach. The way and purpose of the safety management system is to take a proactive approach to recognize and prevent unsafe situations before they cause accidents or breakdowns, or to take a reactive approach to find the causes of accidents and breakdowns that have occurred as a result of certain factors and to take the necessary measures to prevent the same situations from happening again in the sector. The field of data mining, which is necessary to predict the future behavior of customers in the field of marketing, is an area that marketing also values. In this study, data mining studies to ensure safety in the aviation industry and the security of customer information in marketing will be emphasized, firstly, the concept and importance of data mining will be mentioned. 展开更多
关键词 data mining AVIATION CUSTOMER SAFETY MARKETING
下载PDF
Construction and Practice of Teaching Evaluation System Based on Data Mining
10
作者 Yanfang Zong 《Journal of Electronic Research and Application》 2024年第5期141-147,共7页
The teaching quality evaluation system based on data mining technology can accurately and fairly identify the core driving factors to improve teaching quality.This method adopts the analysis of big data correlation ru... The teaching quality evaluation system based on data mining technology can accurately and fairly identify the core driving factors to improve teaching quality.This method adopts the analysis of big data correlation rules,including data collection and processing preparation steps,builds the data warehouse of association rules,and then generates an educational quality evaluation framework using the principle of data mining.Based on this,this paper analyzes the construction design and method of the teaching evaluation system under data mining,hoping to provide help for the improvement of the teaching evaluation system and the improvement of teaching quality. 展开更多
关键词 data mining Teaching evaluation system Correlation rules
下载PDF
Exploring the medication pattern and mechanism of action of traditional Chinese medicine in treating polycystic ovary syndrome with kidney deficiency and blood stasis based on data mining and network pharmacology
11
作者 Li-Jun Zhou Yi-Ling Liu 《Medical Data Mining》 2024年第1期40-52,共13页
Background:Using network pharmacology to explore the potential molecular mechanism of traditional Chinese medicine in treating polycystic ovary syndrome(PCOS)with kidney deficiency and blood stasis syndrome.Method:Col... Background:Using network pharmacology to explore the potential molecular mechanism of traditional Chinese medicine in treating polycystic ovary syndrome(PCOS)with kidney deficiency and blood stasis syndrome.Method:Collect the related literature materials of PCOS with kidney deficiency and blood stasis syndrome treated by traditional Chinese medicine in four databases in recent ten years,extract the information of prescriptions and complete the frequency analysis.Traditional Chinese Medicine Systems Pharmacology Database was used to screen out the effective components.Use Online Mendelian Inheritance in Man and other databases to screen PCOS disease targets.The intersection targets obtained by clustering prescription and PCOS disease targets were submitted to STRING database for protein-protein interaction network analysis,and Gene Ontology(GO)and Kyoto Encyclopedia of Genes and Genomes pathways were analysed by Metascape.Result:There are 155 kinds of traditional Chinese medicines used in the literature.The most commonly utilized ones are Cuscutae Semen,Angelicae Sinensis Radix,and Rehmanniae Radix Praeparata.The results of the cluster analysis indicated that the plants most commonly found throughout the prescription were Leonuri Herba,Lycopi Herba,Dipsaci Radix,etc.GO results show that biological processes include cell reaction to organic nitrogen compounds and cell reaction to nitrogen compounds.The functional display of GO molecule includes cytokine receptor binding,signal receptor regulator activity and so on.Kyoto Encyclopedia of Genes and Genomes results show that the possible mechanisms of action are cancer pathway,an endocrine resistance signal pathway.Conclusion:Through data mining,the cluster prescription for PCOS with kidney deficiency and blood stasis syndrome is Leonuri Herba,Lycopi Herba,Dipsaci Radix,etc.The network pharmacology research of cluster prescription shows that the main drug components for treating PCOS with kidney deficiency and blood stasis syndrome are quercetin,kaempferol,luteolin,tanshinone IIA,etc.,which act on PTGS2,NCOA2,and other targets,and treat PCOS with kidney deficiency and blood stasis syndrome through cancer and endocrine resistance. 展开更多
关键词 polycystic ovary syndrome data mining syndrome of kidney deficiency and blood stasis network pharmacology
下载PDF
A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques
12
作者 Burak Cem Kara Can Eyüpoglu 《Computers, Materials & Continua》 SCIE EI 2023年第8期1515-1535,共21页
Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off betw... Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve.Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area.When existing approaches are investigated,one of the most significant difficulties discovered is the presence of outlier data in the datasets.Outlier data has a negative impact on data utility.Furthermore,k-anonymity algorithms,which are commonly used in the literature,do not provide adequate protection against outlier data.In this study,a new data anonymization algorithm is devised and tested for boosting data utility by incorporating an outlier data detection mechanism into the Mondrian algorithm.The connectivity-based outlier factor(COF)algorithm is used to detect outliers.Mondrian is selected because of its capacity to anonymize multidimensional data while meeting the needs of real-world data.COF,on the other hand,is used to discover outliers in high-dimensional datasets with complicated structures.The proposed algorithm generates more equivalence classes than the Mondrian algorithm and provides greater data utility than previous algorithms based on k-anonymization.In addition,it outperforms other algorithms in the discernibility metric(DM),normalized average equivalence class size(Cavg),global certainty penalty(GCP),query error rate,classification accuracy(CA),and F-measure metrics.Moreover,the increase in the values of theGCPand error ratemetrics demonstrates that the proposed algorithm facilitates obtaining higher data utility by grouping closer data points when compared to other algorithms. 展开更多
关键词 data anonymization privacy-preserving data publishing K-ANONYMITY GENERALIZATION MONDRIAN
下载PDF
Multi Attribute Case Based Privacy-preserving for Healthcare Transactional Data Using Cryptography
13
作者 K.Saranya K.Premalatha 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2029-2042,共14页
Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge ... Medical data mining has become an essential task in healthcare sector to secure the personal and medical data of patients using privacy policy.In this background,several authentication and accessibility issues emerge with an inten-tion to protect the sensitive details of the patients over getting published in open domain.To solve this problem,Multi Attribute Case based Privacy Preservation(MACPP)technique is proposed in this study to enhance the security of privacy-preserving data.Private information can be any attribute information which is categorized as sensitive logs in a patient’s records.The semantic relation between transactional patient records and access rights is estimated based on the mean average value to distinguish sensitive and non-sensitive information.In addition to this,crypto hidden policy is also applied here to encrypt the sensitive data through symmetric standard key log verification that protects the personalized sensitive information.Further,linear integrity verification provides authentication rights to verify the data,improves the performance of privacy preserving techni-que against intruders and assures high security in healthcare setting. 展开更多
关键词 privacy-preserving crypto policy medical data mining integrity and verification personalized records CRYPTOGRAPHY
下载PDF
Privacy-Preserving Deep Learning on Big Data in Cloud
14
作者 Yongkai Fan Wanyu Zhang +2 位作者 Jianrong Bai Xia Lei Kuanching Li 《China Communications》 SCIE CSCD 2023年第11期176-186,共11页
In the analysis of big data,deep learn-ing is a crucial technique.Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas.Nev-ertheless,there is a ... In the analysis of big data,deep learn-ing is a crucial technique.Big data analysis tasks are typically carried out on the cloud since it offers strong computer capabilities and storage areas.Nev-ertheless,there is a contradiction between the open nature of the cloud and the demand that data own-ers maintain their privacy.To use cloud resources for privacy-preserving data training,a viable method must be found.A privacy-preserving deep learning model(PPDLM)is suggested in this research to ad-dress this preserving issue.To preserve data privacy,we first encrypted the data using homomorphic en-cryption(HE)approach.Moreover,the deep learn-ing algorithm’s activation function—the sigmoid func-tion—uses the least-squares method to process non-addition and non-multiplication operations that are not allowed by homomorphic.Finally,experimental re-sults show that PPDLM has a significant effect on the protection of data privacy information.Compared with Non-Privacy Preserving Deep Learning Model(NPPDLM),PPDLM has higher computational effi-ciency. 展开更多
关键词 big data cloud computing deep learning homomorphic encryption privacy-preserving
下载PDF
Attacks on Anonymization-Based Privacy-Preserving: A Survey for Data Mining and Data Publishing 被引量:1
15
作者 Abou-el-ela Abdou Hussien Nermin Hamza Hesham A. Hefny 《Journal of Information Security》 2013年第2期101-112,共12页
Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with t... Data mining is the extraction of vast interesting patterns or knowledge from huge amount of data. The initial idea of privacy-preserving data mining PPDM was to extend traditional data mining techniques to work with the data modified to mask sensitive information. The key issues were how to modify the data and how to recover the data mining result from the modified data. Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. In contrast, privacy-preserving data publishing (PPDP) may not necessarily be tied to a specific data mining task, and the data mining task may be unknown at the time of data publishing. PPDP studies how to transform raw data into a version that is immunized against privacy attacks but that still supports effective data mining tasks. Privacy-preserving for both data mining (PPDM) and data publishing (PPDP) has become increasingly popular because it allows sharing of privacy sensitive data for analysis purposes. One well studied approach is the k-anonymity model [1] which in turn led to other models such as confidence bounding, l-diversity, t-closeness, (α,k)-anonymity, etc. In particular, all known mechanisms try to minimize information loss and such an attempt provides a loophole for attacks. The aim of this paper is to present a survey for most of the common attacks techniques for anonymization-based PPDM & PPDP and explain their effects on Data Privacy. 展开更多
关键词 Privacy K-ANONYMITY data mining privacy-preserving data PUBLISHING privacy-preserving data mining
下载PDF
Integrative multi-omics and systems bioinformatics in translational neuroscience:A data mining perspective 被引量:4
16
作者 Lance M.O'Connor Blake A.O'Connor +2 位作者 Su Bin Lim Jialiu Zeng Chih Hung Lo 《Journal of Pharmaceutical Analysis》 SCIE CAS CSCD 2023年第8期836-850,共15页
Bioinformatic analysis of large and complex omics datasets has become increasingly useful in modern day biology by providing a great depth of information,with its application to neuroscience termed neuroinformatics.Da... Bioinformatic analysis of large and complex omics datasets has become increasingly useful in modern day biology by providing a great depth of information,with its application to neuroscience termed neuroinformatics.Data mining of omics datasets has enabled the generation of new hypotheses based on differentially regulated biological molecules associated with disease mechanisms,which can be tested experimentally for improved diagnostic and therapeutic targeting of neurodegenerative diseases.Importantly,integrating multi-omics data using a systems bioinformatics approach will advance the understanding of the layered and interactive network of biological regulation that exchanges systemic knowledge to facilitate the development of a comprehensive human brain profile.In this review,we first summarize data mining studies utilizing datasets from the individual type of omics analysis,including epigenetics/epigenomics,transcriptomics,proteomics,metabolomics,lipidomics,and spatial omics,pertaining to Alzheimer's disease,Parkinson's disease,and multiple sclerosis.We then discuss multi-omics integration approaches,including independent biological integration and unsupervised integration methods,for more intuitive and informative interpretation of the biological data obtained across different omics layers.We further assess studies that integrate multi-omics in data mining which provide convoluted biological insights and offer proof-of-concept proposition towards systems bioinformatics in the reconstruction of brain networks.Finally,we recommend a combination of high dimensional bioinformatics analysis with experimental validation to achieve translational neuroscience applications including biomarker discovery,therapeutic development,and elucidation of disease mechanisms.We conclude by providing future perspectives and opportunities in applying integrative multi-omics and systems bioinformatics to achieve precision phenotyping of neurodegenerative diseases and towards personalized medicine. 展开更多
关键词 Multi-omics integration Systems bioinformatics data mining Human brain profile reconstruction Translational neuroscience
下载PDF
Correlation knowledge extraction based on data mining for distribution network planning 被引量:1
17
作者 Zhifang Zhu Zihan Lin +4 位作者 Liping Chen Hong Dong Yanna Gao Xinyi Liang Jiahao Deng 《Global Energy Interconnection》 EI CSCD 2023年第4期485-492,共8页
Traditional distribution network planning relies on the professional knowledge of planners,especially when analyzing the correlations between the problems existing in the network and the crucial influencing factors.Th... Traditional distribution network planning relies on the professional knowledge of planners,especially when analyzing the correlations between the problems existing in the network and the crucial influencing factors.The inherent laws reflected by the historical data of the distribution network are ignored,which affects the objectivity of the planning scheme.In this study,to improve the efficiency and accuracy of distribution network planning,the characteristics of distribution network data were extracted using a data-mining technique,and correlation knowledge of existing problems in the network was obtained.A data-mining model based on correlation rules was established.The inputs of the model were the electrical characteristic indices screened using the gray correlation method.The Apriori algorithm was used to extract correlation knowledge from the operational data of the distribution network and obtain strong correlation rules.Degree of promotion and chi-square tests were used to verify the rationality of the strong correlation rules of the model output.In this study,the correlation relationship between heavy load or overload problems of distribution network feeders in different regions and related characteristic indices was determined,and the confidence of the correlation rules was obtained.These results can provide an effective basis for the formulation of a distribution network planning scheme. 展开更多
关键词 Distribution network planning data mining Apriori algorithm Gray correlation analysis Chi-square test
下载PDF
On the Privacy-Preserving Outsourcing Scheme of Reversible Data Hiding over Encrypted Image Data in Cloud Computing 被引量:11
18
作者 Lizhi Xiong Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2018年第6期523-539,共17页
Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the clou... Advanced cloud computing technology provides cost saving and flexibility of services for users.With the explosion of multimedia data,more and more data owners would outsource their personal multimedia data on the cloud.In the meantime,some computationally expensive tasks are also undertaken by cloud servers.However,the outsourced multimedia data and its applications may reveal the data owner’s private information because the data owners lose the control of their data.Recently,this thought has aroused new research interest on privacy-preserving reversible data hiding over outsourced multimedia data.In this paper,two reversible data hiding schemes are proposed for encrypted image data in cloud computing:reversible data hiding by homomorphic encryption and reversible data hiding in encrypted domain.The former is that additional bits are extracted after decryption and the latter is that extracted before decryption.Meanwhile,a combined scheme is also designed.This paper proposes the privacy-preserving outsourcing scheme of reversible data hiding over encrypted image data in cloud computing,which not only ensures multimedia data security without relying on the trustworthiness of cloud servers,but also guarantees that reversible data hiding can be operated over encrypted images at the different stages.Theoretical analysis confirms the correctness of the proposed encryption model and justifies the security of the proposed scheme.The computation cost of the proposed scheme is acceptable and adjusts to different security levels. 展开更多
关键词 Cloud data security re-encryption reversible data hiding cloud computing privacy-preserving.
下载PDF
A Survey on the Privacy-Preserving Data Aggregation in Wireless Sensor Networks 被引量:4
19
作者 XU Jian YANG Geng +1 位作者 CHEN Zhengyu WANG Qianqian 《China Communications》 SCIE CSCD 2015年第5期162-180,共19页
Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to s... Wireless sensor networks(WSNs)consist of a great deal of sensor nodes with limited power,computation,storage,sensing and communication capabilities.Data aggregation is a very important technique,which is designed to substantially reduce the communication overhead and energy expenditure of sensor node during the process of data collection in a WSNs.However,privacy-preservation is more challenging especially in data aggregation,where the aggregators need to perform some aggregation operations on sensing data it received.We present a state-of-the art survey of privacy-preserving data aggregation in WSNs.At first,we classify the existing privacy-preserving data aggregation schemes into different categories by the core privacy-preserving techniques used in each scheme.And then compare and contrast different algorithms on the basis of performance measures such as the privacy protection ability,communication consumption,power consumption and data accuracy etc.Furthermore,based on the existing work,we also discuss a number of open issues which may intrigue the interest of researchers for future work. 展开更多
关键词 wireless sensor networks data aggregation privacy-preserving
下载PDF
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing 被引量:3
20
作者 YANG Pan 《China Communications》 SCIE CSCD 2014年第8期73-84,共12页
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for ... With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud security.When data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud service providers,they need some information of the data to provide high QoS services;and for authorized users,they need to access to the true value of data.The existing privacy-preserving methods can't meet all the needs of the three parties at the same time.To address this issue,we propose a retrievable data perturbation method and use it in the privacy-preserving in data outsourcing in cloud computing.Our scheme comes in four steps.Firstly,an improved random generator is proposed to generate an accurate "noise".Next,a perturbation algorithm is introduced to add noise to the original data.By doing this,the privacy information is hidden,but the mean and covariance of data which the service providers may need remain unchanged.Then,a retrieval algorithm is proposed to get the original data back from the perturbed data.Finally,we combine the retrievable perturbation with the access control process to ensure only the authorized users can retrieve the original data.The experiments show that our scheme perturbs date correctly,efficiently,and securely. 展开更多
关键词 privacy-preserving data perturbation RETRIEVAL access control cloudcomputing
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部